Publication Title An Overview of ATM: Technology for High-Speed Multimedia.
Publication Type journal
Publisher Global Communications, UK, Interactive ’99, 188 – 196
Paper Link nil
Publication Authors Adewale O. S. and Falaki S. O.
Year Published 3-24
Abstract The paper highlighted some of asynchronous transfer mode’s (ATM) issues and problems. Also presented in the paper is the internetworking of an ATM to existing local area networks with emphasis on local area network emulation. ATM is an important component of the strategic plan for the networking of the future.
Publication Title Introducing Asynchronous Transfer Mode: An Emerging Standard for High-Speed Networking,
Publication Type journal
Publisher Journal of Computer Science and Its Applications
Paper Link nil
Publication Authors Adewale O. S. and Falaki, S. O. (1999)
Year Published 1999
Abstract The paper highlighted asynchronous transfer mode’s ability to support video, voice and data simultaneously which other network technologies cannot do. Because asynchronous transfer mode is scalable, it can erase the barriers between the local area network, metropolitan area network and wide area network therefore achieving ubiquitous data network.
Publication Title Simulation of Self-Similar Variable Bit Rate Video Traffic.
Publication Type journal
Publisher Benin Journal of Advances in Computer Science, 1(2): 148 – 170
Paper Link nil
Publication Authors Adewale O. S. (2000)
Year Published 2000
Abstract The paper proposed an accurate and computationally effective method for the generation of an MPEG-like trace. Since MPEG traffic has been demonstrated to be self-similar, the proposed algorithm which is based on fast Fourier transform, generates a video trace for both short-range dependence and long-range dependence plus the probability density function of any given MPEG sequence.
Publication Title A Survey of Statistical Source Models for Self-Similar ATM VBR Video Traffic
Publication Type journal
Publisher Benin Journal of Advances in Computer Science, 1(2): 171–188
Paper Link nil
Publication Authors Adewale O. S. (2000)
Year Published 2000
Abstract This paper presented a survey of statistical source models for self-similar asynchronous transfer mode variable bit rate video traffic. Each of these models is described along with its advantages and disadvantages. The transport of variable bit rate video from applications such as videoconferencing, video telephone and full-motion broadcast or studio quality video is generally expected to become one of the major traffic components of future high-speed networks.
Publication Title Recent Trends in Computer Systems Architectures.
Publication Type journal
Publisher Benin Journal of Advances in Computer Science, 1(1):23 – 33
Paper Link nil
Publication Authors Falaki, S. O. and Adewale O. S. (2000).
Year Published 2000
Abstract This paper highlighted the features of high–performance computer systems architecture, past, present and future, so as to simulate researchers to contribute to the progress. The rapid rate of improvement has come both from advances in the technology used to build computers and from innovation in computer design.
Publication Title Practical Skill in Nigeria Teaching for Technological Development in Nigeria: Prospects and Challenges.
Publication Type journal
Publisher Journal of Multidisciplinary Studies, 6(1):56–62
Paper Link nil
Publication Authors Obiniyi, A. A., Amos, T. T. and Adewale O S (2001).
Year Published 2001
Abstract This paper discussed the relevance of practical skills in computer technology to Nigerian technological development. It recommended steps to having a solid technical practical skill foundation.
Publication Title A Comparative Study of H.323 and SIP for Internet Telephony.
Publication Type journal
Publisher Benin Journal of Advances in Computer Science, 2(1 & 2):173 – 184
Paper Link nil
Publication Authors Adewale O. S.
Year Published 2001
Abstract The paper compared two competing protocols for internet telephony using similar scenarios for fairness of comparison in terms of complexity, extensibility, scalability, quality of service, interoperability and ease of implementation.
Publication Title On the Effective Bandwidth of Self-Similar Traffic Sources
Publication Type journal
Publisher Benin Journal of Advances in Computer Science, 2(1 & 2):163 – 172
Paper Link https://www.academia.edu/28794446
Publication Authors Adewale O. S., (2001)
Year Published 2001
Abstract This paper presented an approach that efficiently estimates the probability of rare packet losses that may occur when a multiplexer is fed with synthetic traffic from self-similar sources. Also, mathematical expressions for computing the effective bandwidth required for single homogeneous and aggregate homogeneous self-similar sources were obtained and illustrated using simulation techniques.
Publication Title The Generic Architecture for Data/Internet Telephony in Nigeria.
Publication Type journal
Publisher Telematics and informatics, 20(4): 297 – 313
Publication Authors Adewale O. S. and Falaki S O (2003)
Year Published 3-17
Abstract This paper proposed an innovative generic model for delivering voice and data traffics over IP to residential, small offices, medium and large–scale enterprises in Nigeria at reduced price while eliminating the current problems associated with NITEL telephony services. The paper also discussed the benefits and barriers of implementing internet telephony as well as internet telephony options.
Publication Title Simulation of Self-Similar VBR Video Traffic in the Wavelet Domain.
Publication Type journal
Publisher Journal of Computer Science and Its Applications, 9(1):129–135
Paper Link nil
Publication Authors Adewale O. S. and Falaki S. O. (2003):
Year Published 2003
Abstract modelling directly both the long-range dependence and short-range dependence found recently in the variable bit rate video traffic. This model is able to attain the lowest computational complexity and to generate variable bit rate video traces in the wavelet domain
Publication Title Internet-Based Telemedicine System in Nigeria.
Publication Type journal
Publisher International Journal of Information Management, 24:221 – 234
Publication Authors Adewale O. S. (2004)
Year Published 2004
Abstract In this paper, an internet-based telemedicine environment for Nigeria was developed specifically to support consultations among remotely placed patients, rural health workers and specialists in the urban cities and provide a secure access to remote patients’ records. The paper also discussed some of the challenges and implementation issues of telemedicine in Nigeria
Publication Title Neural Network Model for Course Registration System in Tertiary Institutions in Nigeria.
Publication Type journal
Publisher Advances in Natural and Applied Sciences Research, 3:27 – 33
Paper Link nil
Publication Authors Sadiq F. I, Adewale O. S and Momodu I. B. A (2005)
Year Published 2005
Abstract The paper presented a package based on neural network approach for monitoring the course registration system in tertiary institutions running a unit course system. If implemented, the system will make it possible for every student to adhere strictly to the departmental or faculty rules guiding the course registration processes.
Publication Title Neural Network Model for CGPA Computation Process in Nigeria Tertiary Institutions,
Publication Type journal
Publisher The Information Technologist, 3(1):54 – 62
Paper Link https://doi.org/10.4314/ict.v3i1.31963
Publication Authors Sadiq F. I, Falaki S. O and Adewale O. S (2006).
Year Published 2006
Abstract This paper presented a neural network model for computing the CGPA of students in tertiary institutions using the Federal University of Technology, Akure, Nigeria as a case study. This process will facilitate easy and error-free computation of GPA and CGPA processes.
Publication Title Elliptic Curve Key Agreement Scheme.
Publication Type journal
Publisher Standardizer of the Nigerian Academics, 3(1), pp. 34 – 42
Paper Link nil
Publication Authors Alese B. K, Falaki S. O and Adewale O. S (2006)
Year Published 2006
Abstract This paper presented new algorithms for computing key agreement schemes based on elliptic curve mathematics. The paper showed how the various schemes work under different properties and their bandwidth have also been specified.
Publication Title Service Model Estimation for Technical Efficiency of Internet Service Providers in Nigeria.
Publication Type journal
Publisher Journal of Information Technology Impact, 6(3), pp. 135 – 152
Paper Link https://www.academia.edu/21618070
Publication Authors Alese B. K, Ogunbanjo S. A, Falaki S. O and Adewale O. S (2006)
Year Published 2006
Abstract providers in Western Nigeria. The technology of the Internet service providers is assumed to be specified by the Stochastic Translog frontier model as a relationship among certain network characteristics taken in as inputs in the day-to-day provision of services. Consequently, an ‘Internet Service Model Estimation Questionnaire’ was designed and administered to a total of 203 randomly sampled Internet service providers in Western Nigeria, in order to collect data about these network characteristics. The collected data were analysed using the Statistical Package for Social Scientists (SPSS) for Windows software and the Stochastic Frontier software. Two models were fitted from the analysed data using the two softwares and sample estimations were made with the models. Finally, a comparative analysis of estimations from the two models was carried out. The hypotheses that the Cobb-Douglas Model adequately represents the data were accepted in both methods. However, it was found that the Frontier estimates perform better because of the capability of the software to isolate the inefficiency errors in the prediction and the generation of firm-level technical efficiency for each of the service providers. It was found that although the means technical efficiency is high (about 91.2%), wide variation of about 64.9% exists between the lowest and the highest technically efficient service providers. Furthermore, network characteristics such as transmission link and transmission bandwidth have the most effect on the technical efficiency of a service provider in Western Nigeria.
Publication Title Network anomalous intrusion detection using Fuzzy-Bayes.
Publication Type journal
Publisher In IFIP International Federation of Information Processing 228, Intelligent Processing III, (eds. Shi Z.; Shimohara K. and Fenga D.), pp. 525–530, Springer.
Paper Link https://doi.org/10.1007/978-0-387-44641-7_56
Publication Authors Adetunmbi A. O.; Shi Z.; Shi Z. and Adewale O. S. (2006)
Year Published 2006
Abstract Security of networking systems has been an issue since computer networks became prevalent, most especially now that Internet is changing the facie computing, intrusions pose significant threats to the integrity, confidentiality and availability of information for the internet users. In this paper, a new approach to real-time network anomaly intrusion detection via Fuzzy-Bayesian is proposed to detect malicious activity against computer network; the framework is described to demonstrate the effectiveness of the technique. The combination of fuzzy with Bayesian classifier will improve the overall performance of Bayes based intrusion detection system (IDS). Also, the feasibility of our method is demonstrated by the experiment performed on KDD 1999 IDS data set.
Publication Title Web-based neural network model for undergraduate admission selection and placement.
Publication Type journal
Publisher The Pacific Journal of Science and Technology, 8(2): 367–384
Paper Link nil
Publication Authors Adewale O. S.; Adebiyi A. B. And Solanke O. O. (2007)
Year Published 2007
Abstract This paper developed a model that provides a time–efficient, detailed and unbiased automated procedure for selecting the most qualified candidates for admission into universities. It also ensures that candidates who fail to meet some of the admission requirements for their chosen course are automatically considered for placement into another appropriate course. Finally, it provides a self–screening admission system for candidates.
Publication Title Factor analysis approach to computer network/information security awareness in south-western Nigeria
Publication Type journal
Publisher The Pacific Journal of Science and Technology, 8(2): 357 - 366.
Paper Link nil
Publication Authors Alese B. K; Olojo O. J.; Adewale O. S.; Adetunmbi A. O and Falaki O. S (2007)
Year Published 2007
Abstract This study was designed to investigate Computer Network Security awareness using a factor analytic approach with Principal factoring method. The principal objective of the study principally was to determine and identify how many latent constructs actually influence Computer Network Security usage and the underlying relationship among them. The work also sought to investigate whether there exists any regularity and order in Computer Network Security Usage. The study also sought to determine whether the nature of an establishment would influence the usage of computer network security measure. Data was collected from Computer Network users from seven states of the South Western part of Nigeria. A 43 item questionnaire was designed based on different security measures/procedures on Computer Security measures/procedures on Computer Network. The questionnaire used Likert scale structured questions to elicit responses on the frequency of usage of security procedures on the Network. The questionnaire was validated and a test for internal consistently gave Cronbach alpha co-efficient of 0.85. A total of 430 respondents were sampled. The findings of the study revealed that 14 factors constitute the dominant influence internal attributes on Computer Network Security usage. There was regularity in the pattern of usage. The variables of similar characteristics and in the same family of internal attributes exhibit the same pattern of loadings. It was also observed that the nature of an establishment greatly influences the type of security measures/procedures used. The most frequently used network security measure was found to be “monitor host and network activities†while “availability of any personal cryptographic tools†was found to be the least used measure.
Publication Title Technical and cost efficiency of GSM commercial call centres: a stochastic frontier approach.
Publication Type journal
Publisher Journal of Information Technology Impact, 7(3):227 - 238
Paper Link nil
Publication Authors Oluwadare S. A. and Adewale O. S. (2007)
Year Published 2007
Abstract economy in recent years, is in the area of Global System for Mobile Communication (GSM). The introduction of GSM into Nigeria in 2001 has opened up a lot of opportunities ranging from ease of communication to commerce, industry, trade and tourism; and employment, among others. The Telecommunications industry has attracted considerable investment, providing employment opportunities for several thousands of unemployed school leavers and graduates of tertiary institutions, most especially through the establishment of GSM commercial call centres. This paper is based on an empirical study of GSM commercial call operators in Osogbo, the capital of Osun State, Nigeria. A random sample of twenty out of the 120 Enumeration Areas (EAs) in Osogbo was taken. Also, ten GSM commercial call centres were randomly chosen from the list of GSM commercial call centres in each of the twenty EAs earlier selected. This produced a total of 200 GSM commercial call centres. A structured questionnaire was used to collect data on the technical and cost efficiencies of the centres. In all, 178 questionnaires were duly filled, returned and analysed. The study employed the use of Stochastic Frontier Package version 4.1 to investigate the presence or otherwise, of technical and/or cost inefficiencies in the operations of the centres. The Stochastic Frontier Analysis revealed that number of handsets, and number of network available affect technical efficiency while education, complimentary services, network quality; and location affect cost efficiency. The study, among others, recommends that government and other stakeholders should channel micro-credit to the GSM commercial call operators so as to enable them invest on those factors that would enhance their technical and cost efficiencies.
Publication Title Internet-based collaborative and distance education system.
Publication Type journal
Publisher The Journal of Computer Science and Its Applications, 14(1): pp. 86-96.
Paper Link nil
Publication Authors Adewale O. S and Agbonifo O. C(2007),
Year Published 2007
Abstract This paper developed an internet–based collaborative and distance education system that allows increased access to high quality university education. A multi–layered hierarchical course structure model for collaborative and learning system based on curriculum sequencing and study performance approaches was also developed. This technology–based learning would also establish high quality and standard that cannot be compromised by any factor.
Publication Title Development of a payment system for electronic commerce and banking industry in Nigeria
Publication Type journal
Publisher The Journal of Computer Science and Its Applications, 14(1): 65 - 74
Paper Link nil
Publication Authors Akinyede R. O and Adewale O. S. (2007).
Year Published 2007
Abstract The paper developed a web–based payment system for electronic commerce and banking industry in Nigeria. This system will promote easy acquisition and disposal of goods and services on the internet. Privacy and protection are also provided by the system.
Publication Title Modelling university students’ academic records using artificial neural networks.
Publication Type journal
Publisher Journal of League of Researchers in Nigeria, 8(2):54–62
Paper Link nil
Publication Authors Baha B. Y.; Adewale O. S. and Blamah N. V. (2007),
Year Published 2007
Abstract
nil
Publication Title Design of a neural network based optical character recognition system for musical notes.
Publication Type journal
Publisher The Pacific Journal of Science and Technology, 9(1): 45-59
Paper Link nil
Publication Authors Akinwonmi A. E; Adewale O. S., Alese B. K and Adetunmbi A. O (2008).
Year Published 2008
Abstract Optical character recognition is the procedure by which the computer converts printed materials into ASCII files for editing, compact storage, fast retrieval, and for other purposes. In this study, a neural network approach was applied to perform high accuracy recognition on music score. There are three parts in the study. The first part designed an image preprocessor to obtain sets of images of 17 musical symbols consisting of notes and other glyphs for down-sampling using 8 different digitization procedures to serve as inputs. The second part is composed of the design and implementation of a neural network using a feed-forward with backward propagation. The network was trained using digitized down-sampled images of the symbol. The trained network was saved and tested with sample musical symbols for recognition. There were recognition errors. The recognized data was presented to the third part, which was designed as a Cakewalk Application Language (CAL) script generator. CAL scripts were obtained and presented to Cakewalk Audio Pro for Musical Instrument Digital Interfaces (MIDI) production.
Publication Title Network intrusion detection based on Rough Set and k-Nearest Neighbour.
Publication Type journal
Publisher International Journal of computing and ICT Research; 2(1):60-66.
Paper Link nil
Publication Authors Adetunmbi A. O; Falaki S. O; Adewale O. S and Alese B. K. (2008).
Year Published 2008
Abstract Increasing numbers of interconnected networks to the internet have led to an increase in cyber- attacks which necessitates the need for an effective intrusion detection system. In this paper, two machine learning techniques: Rough Set (LEM2 Algorithm) and k-Nearest Neighbour (kNN) are used for intrusion detection. Rough set is a classic mathematical tool for feature extraction in a dataset which also generates explainable rules for intrusion detection. The experimental study is done on the international Knowledge Discovery and Data mining tools competition (KDD) dataset for benchmarking intrusion detection systems. In the entire experimentations, we compare the performance of Rough Set with k-Nearest Neighbour. The results generated from the experiment reveal that k-nearest neighbour has a better performance in terms of accuracy but consumes more memory and computational time. Rough Sets classifies at relative short time and employs simple explainable rules.
Publication Title Naive Bayes for intrusion detection and discretisation effect on its performance.
Publication Type journal
Publisher Journal of Research in Physical Sciences, 4(4):53–58.
Paper Link nil
Publication Authors Adetunmbi A. O.; Alese B. K. and Adewale O. S. (2008).
Year Published 2008
Abstract
nil
Publication Title Comparative analysis of Rivest Shamir Adleman (RSA), Rabin and El Gamal public key cryptosystems.
Publication Type journal
Publisher Journal of the Nigerian Association of Mathematical Physics, 13:289–299
Paper Link nil
Publication Authors Olajide M. S.; Adewale O. S.; Alese B. K. and Adetunmbi A. O. (2008),
Year Published 2008
Abstract In this paper, a comparative analysis of the three public key cryptosystems (RSA, Rabin and El Gamal) that are thought to be secure was carried out. Each of the cryptographic schemes was appraised with a view to exposing their strengths and weaknesses.
Publication Title Online projects and theses management system.
Publication Type journal
Publisher Journal of Physical Sciences, 3(2):103 - 110.
Paper Link nil
Publication Authors Ojokoh B. A.; Adewale O. S. and Falaki S. O. (2008),
Year Published 2008
Abstract This paper presents the development, implementation and deployment of an outline digital projects and theses generator resulting in the implementation of digital library services for interested users. Hence solving the problems of searching for information about past projects and management of large logs of students’ projects.
Publication Title Improving on the smoothing technique for obtaining emission probabilities on hidden Markov models.
Publication Type journal
Publisher Oriental Journal of Computer Science and Technology, 1(1):15 - 24
Paper Link nil
Publication Authors Ojokoh B. A.; Adewale O. S. and Falaki S. O. (2008)
Year Published 2008
Abstract Hidden Markov Models (HMMs) have been shown to achieve good performance when applied to information extraction tasks. This paper describes the training aspect of exploring HMMs for the task of metadata extraction from tagged bibliographic references. The main contribution of this work is the improvement of the technique proposed by earlier researchers for smoothing emission probabilities in order to avoid the occurrence of zero values. The results show the effectiveness of the proposed method.
Publication Title Review and analysis of wireless network and mobile routing protocols.
Publication Type journal
Publisher Journal of Biological and Physical Sciences, 14(1):77-86.
Paper Link nil
Publication Authors Ogundele O. S.; Adewale O. S. and Alese B. K. (2009).
Year Published 2009
Abstract This paper carried out the analysis of various routing protocols that are available to mobile and wireless network on the basis of when and how the routes are discovered which can be seen to be divided into two classes: table–driven and on–demand routing. In table–driven routing protocols, consistent and up–to–date routing information to all nodes are maintained at each node, whereas, in on–demand routing the routes are created only when desired by the source host.
Publication Title Automated document metadata extraction.
Publication Type journal
Publisher Journal of Information Science 35(5)
Paper Link https://doi.org/10.1177/0165551509105195
Publication Authors Ojokoh B. A, Adewale O. S. and Falaki S. O (2009)
Year Published 2009
Abstract Web documents are available in various forms, most of which do not carry additional semantics. This paper presents a model for general document metadata extraction. The model combines segmentation by keywords and pattern matching techniques was implemented using PHP, MySQL, JavaScript and HTML. The system was tested with 40 randomly selected PDF documents (mainly theses). An evaluation of the system was done using standard criteria measures namely precision, recall, accuracy and F-measure. The results show that the model is relatively effective for the task of metadata extraction, especially for theses and dissertations. A combination of machine learning with these rule-based methods will be explored in the future for better results.
Publication Title Web-based approach to career counselling.
Publication Type journal
Publisher The African Symposium: an Online Journal of African Education Research Network, 10(1).
Paper Link nil
Publication Authors Adewale O. S., Ibam E. O. and Obiniyi A. A. (2010).
Year Published 2010
Abstract Due to high rate of societal malaise (drug addiction, examination malpractices, prostitution, dropouts) in our tertiary institutions today which have hampered effective learning, one is forced to look for an alternative way of reducing such societal problems through effective career counselling systems. Online career counselling system has emerged as a viable alternative to conventional counselling systems. There are limitations to the existing career counselling approaches in Nigeria. To address these shortcomings, a mathematical model for career online counselling system using fuzzy logic and based on the trait-and-factor approach of counselling was developed to provide career counselling to candidates on the suitability or otherwise of their chosen careers. The model was implemented as a web-based system using Apache as web server, PHP as the server-side scripting language, HTML as client-side scripting language and MySQL as the relational database.
Publication Title Deadlock detection in agent–based virtual knowledge communities.
Publication Type journal
Publisher , Annals. Computer Science Series, 8(2)
Paper Link nil
Publication Authors Ogunleye G. O., Adewale O. S., Adetunmbi A. O. and B. K. Alese (2010).
Year Published 2010
Abstract
nil
Publication Title Web-based classroom system model for computer science programme in Nigeria.
Publication Type journal
Publisher International Institute of Informatics and Systems
Paper Link nil
Publication Authors Adewale O. S., Ibam E. O. and Alese B. K. (2011).
Year Published 2011
Abstract The population of students all over the world is growing without a proportionate increase in teaching/learning resources/infrastructure. There is also much quest for learning in an environment that provides equal opportunities to all learners. The need to provide an equal opportunity learning environment that will hitherto improve the system of education globally has therefore become imperative. Based on these findings, a mathematical model Web-based Virtual Classroom system (WebVCS) was developed to provide a viable medium through which sound education can be offered in tertiary institutions that can carter for varieties of learners irrespective of their abilities, dispositions and geographical locations. The system model is developed based on active learning approach that adopts blended learning theory (Constructivist-Cognivist learning approach), incorporating e-pedagogy that supports collaboration among participants in the web-based Virtual learning environment. The key objects used in creating the WebVCS model are: Courses, Students, Instructors and Learning performances. The system model sets a framework for developers of virtual classrooms and successful implementation of the model leads to students learning by interacting with their peers resulting in the construction of knowledge.
Publication Title A formal approach to modelling delegation policy based on subject attributes and role hierarchy.
Publication Type journal
Publisher International Journal of Computing and ICT Research, 5(1): pp. 65-77.
Paper Link nil
Publication Authors Ogundele O. S., Alese B. K., Falaki S. O., Alowolodu O. D. and Adewale O. S. (2011),
Year Published 2011
Abstract There are considerable number of approaches to policy specification both for security and policy driven network management. This specification sort security policies into two basic types: authorisation and obligation policies. Most of the researches in security policies specification over the years focus on authorisation policy modelling. This paper presented an approach for developing an information security policy model with specific emphasis on delegation of roles as a form of obligation policy. Whilst noting the previous research works on delegation modelling, the subjects and roles attributes were considered in refining and formulating delegation relation attributes rules using concept of set theory. The work was further extended by developing a formal model for role hierarchy based on permissions and integrating it into the delegation model developed to eliminate flatness of subject roles. In the future, a formal model for revocation after delegation and extension of the model with the principle of separation of duties will be considered.
Publication Title A formal structure of separation of duty and trust in modelling delegation policy.
Publication Type journal
Publisher Journal of Computer Science and Technology, 11(2): pp. 100-107.
Paper Link nil
Publication Authors Ogundele O. S., Adewale O. S., Alese B. K. and Falaki S. O. (2011).
Year Published 2011
Abstract There are considerable number of approaches to policy specification both for security management and policy driven network management purposes. This specification sorts security policies into two basic types: authorisation and obligation policies. Most of the researches in security policies specification over the years focus on authorisation policy modelling. This paper presented an approach in the design and modelling of obligation policy as delegation in information security by considering separation of duty and trust as pre-requisite conditions for delegation. The formal structures of the delegation models developed was adapted from the mathematical structures of separation of duty. Three factors of properties, experiences and recommendation were used for the trust modelling. In the future, the development of a formal model for revocation after delegation and integration of appropriate authorisation policy with the model will be considered.
Publication Title An adaptive security model for detecting DDoS attack in virtual knowledge communities.
Publication Type journal
Publisher Journal of Computing and Information Systems, 16(1): pp. 32-38.
Paper Link nil
Publication Authors Ogunleye G. O., Adewale O. S. and Alese B. K. (2012).
Year Published 2012
Abstract This paper presents an architectural approach to detect Distributed Denial of Service (DDoS) in Virtual Knowledge Community (VKC). A Denial-of-Service (DoS) attack is a malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers. Virtual knowledge community is a virtual place where agents can meet, communicate and interact among themselves. The emergence of DDoS attack has become more frequent in today’s network environment. This paper proposes DDoS attack models for detecting attack traffics in VKC and measures to deal with such an attack. Mathematical models are generated to illustrate the proposed approach. The next stage of the work in the future will be the gathering of data to validate the model.
Publication Title Design and development of gait recognition system.
Publication Type journal
Publisher International Journal of Engineering and Technology.
Paper Link nil
Publication Authors Alese B. K., Mogaji S. and Adewale O. S. (2012).
Year Published 2012
Abstract Gait recognition is the process of identifying an individual by the way in which they walk. This is a less unobtrusive biometric, which offers the possibility to identify people at a distance, without any interaction or co-operation from the subject. This property makes it so attractive as a method of identification. This paper presents a system capable of automatic gait recognition. A person’s gait signature is created using a model–based approach. Temporal and spatial metrics extracted from the modal, such as length of torso, shin and variation in angles of the limb or the amplitude of a persons’ walking pattern were used to create a “gait signature†of the individual which are transformed into a self-similarity matrix. The spacio-temporal correlation method was used to identify the subject in subsequent video sequences
Publication Title A web-based virtual classroom system model.
Publication Type journal
Publisher Turkish Online Journal of Distance Education, 13(1): pp. 211-223.
Paper Link https://doi.org/10.17718/TOJDE.58864
Publication Authors Adewale O. S., Ibam E. O. and Alese B. K. (2012).
Year Published 2012
Abstract The population of students all over the world is growing without a proportionate increase in teaching/learning resources/infrastructure. There is also much quest for learning in an environment that provides equal opportunities to all learners. The need to provide an equal opportunity learning environment that will hitherto improve the system of education globally has therefore become imperative. Based on our findings, a mathematical model Web-based Virtual Classroom system (WebVCS) was developed to provide a viable medium through which sound education can be offered in tertiary institutions that can carter for varieties of learners irrespective of their abilities, dispositions and geographical locations. Our system model is developed based on active learning approach that adopts blended learning theory (Constructivist-Cognivist learning approach), incorporating e-pedagogy that supports collaboration among participants in the web-based Virtual learning environment. The key objects used in creating the WebVCS model are: Courses, Students, Instructors and Learning performances. Our system model sets a framework for developers of virtual classrooms and successful implementation of the model leads to students learning by interacting with their peers resulting in the construction of knowledge.
Publication Title Enhancing network life-time of wireless sensor networks through Itinerary definition and mobile agents for routing among sensor nodes
Publication Type conferenceproceeding
Publisher In Proceedings of 2020 International Conference in Mathematics, Computer Engineering and Computer Science
Publication Authors Egwuche O. S., Adewale O. S., Oluwadare S. A. and Daramola O. A.
Year Published 2020
Abstract Mobile agents-based wireless sensor networks offer a good alternative to the conventional client/server network model. Mobile agent is a computational code that is injected inside a packet that migrates among sensor nodes for data collection. The itinerary planning for mobile agent is the most challenging task during mobile agents’ migration in wireless sensor networks. In this study, a routing itinerary scheme for multi-mobile agent itinerary planning for energy efficiency in wireless sensor networks by constructing the spanning tree of wireless sensor nodes is formulated. The itinerary paths of the mobile agent are defined using minimum spanning tree. It is assumed that the sink node is equipped with all the information about the sensor nodes so that the sink can calculate the weights between cluster heads. The proposed energy-aware mobile agent-based model performed better than least energy adaptive clustering hierarchy, local closest first and global closest first.
Publication Title A measurement system for monitoring clients bandwidth usage
Publication Type conferenceproceeding
Publisher In Proceedings of the International Conference on ICT for Africa, Covenant University and Bell University, Ota, Nigeria, March 2011, 3:176–182
Publication Authors Akinyede R. O., Adewale O S and Alese B. K.
Year Published 2011
Abstract
Publication Title Wireless and mobile networks
Publication Type conferenceproceeding
Publisher In Proceedings of the International Conference and Workshop on 3G GSM and Mobile Computing: an emerging growth engine for national development (eds. Atayero A. A.; Matthews V. O. and Ayo C. K.), College of Science and Technology, Covenant University, Ota, Nigeria, pp. 131–141
Publication Authors Thompson A. F., Alese B. K. and Adewale O. S.
Year Published 2007
Abstract Every new generation of technology challenges our world view and paradigms. For example, a paradigm shift occurred when people transition from listening to the radio to watching television programs. Another example is when people went from using standalone personal computers to accessing the Internet. It is no surprise that mobility is causing yet another paradigm shift. Wireless technologies in the last decade have attracted unprecedented attention from wireless service providers, developers, vendors, and users. The breath-taking evolution of wireless technologies, services and business applications has resulted in a wide-scale deployment and usage of wireless and mobile networks. This paper focuses on the three main wireless and mobile networks, its requirements, basic elements associated with mobile and wireless networks, WLAN architectures, technologies and different types.
Publication Title Pipeline Infrastructure Vandalism Monitoring using Wireless Sensor Networks Technique
Publication Type journal
Publisher International Journal of Computer Science and Telecommunications 8(2):39–42
Paper Link https://www.academia.edu/33257085
Publication Authors Yunana K., Adewale O. S., Abdullahi M. B. and Alfa A. A.
Year Published 2017
Abstract Wireless sensor networks are crucial substructure made up of microcontroller, sensing units and communication interfaces that is designed to enable the users possess the capability to measure, collect and responds to phenomenon within the surrounding been monitored. Wireless sensor networks are viewed as an edge between the physical and the virtual world. More so, the demand of fluid transportation from the production point to the region of end users has led to an increase in the number of pipelines that are fabricated globally. The paper presents architecture deployed to the pipeline structure to measure the flow rate, pressure and temperature at the inlet and outlet of the pipeline and then send the sensed data to the control centre via their communication links for immediate response. The simulation procedure carried out using MATLAB Simulink environment shows the capability of the system to detect leakage along the pipeline as evident in the flow and pressure measurement trend of the graphical output results.
Publication Title Performance Evaluation of Global System of Mobile Communications Quality of Service on Crowd sourced Data in a Developing Country
Publication Type journal
Publisher International Journal of Intelligent Computing and Emerging Technologies, 1(1):28-34
Paper Link nil
Publication Authors Dahunsi F. M., Mebawondu J. O., Adewale O. S., Alese B. K. and Momoh A. M.
Year Published 2018
Abstract The interest by stakeholders in the use of the data generated by Global System of Mobile Communications is growing quite fast thereby the need to analyse voice call data, determine voice call pattern, and justify this research work. This research work used questionnaire and crowdsourcing for data collection, also, SVM, Statistical tools such as Split plot, ANOVA were used to analyse the captured and collated data from different states of Nigeria. This work is aimed at analysing, classifying and determining users call interaction between MNOs, states and parameters. Result from the analysis, depict that voice call classification fit radial basis function and sigmoid function with 99.6% accuracy. It is also documented that in terms of interaction between states, operators and parameters, there is significant difference between the parameters, but no significant difference between operators’ services within the states or among operators.
Publication Title A Review of Congestion Control Schemes for Vehicular Ad-Hoc Network (VANET) Communication
Publication Type journal
Publisher International Journal of Vehicular Telematics and Infotainment Systems Volume 1 • Issue 2 • July-December 2017
Paper Link https://doi.org/10.4018/IJVTIS.2017070101
Publication Authors Olotu S. I., Ojokoh B. A. and Adewale O. S.
Year Published 2017
Abstract IIntelligent Transportation Systems (ITS) are built on top of self-organizing networks, known as Vehicular Adhoc Networks (VANET). InVANET, each vehicle equipped with communication devices represents a node and is allowed to send and receive safety messages through wireless communication channels. These messages are either periodic (beacons) or event-driven. Beacons are transmitted periodically while the event-driven messages are generated when an abnormal condition or an imminent danger is detected. The event-driven messages should be delivered to neighbouring nodes with high reliability and limit time as a single delayed or lost message could result in loss of lives. In dense network, the periodic messages broadcast lead to broadcast storm/blindflooding problem in VANETs. It is very important to keep the communication channel free from congestion in order to ensure timely and reliable delivery of event-driven safety messages. This study presents are view of existing congestion controls chemes for VANET swith the aim of discussing the contributions and drawbacks of the algorithms..
Publication Title Efficient anonymous key exchange protocol for roaming in wireless networks
Publication Type journal
Publisher International Journal of Scientific Research Engineering & Technology, 7(2):66–73.
Publication Authors Tom J. J., Alese B. K., Adewale O. S. and Thompson A. F.
Year Published 2017
Abstract Group signature schemes existentially provide anonymity, non-repudiation and can make a mobile device untraceable. But using group signature only in designing anonymous key exchange system is time wasting and consumes much of other computing resources hence the use of it must be minimal especially when deployed on resources-constrained mobile devices. In this paper, we propose the combined use of group signature because of its inherent security properties which are very important when a mobile user roams in the insecure wireless network and message authentication code to reduce the huge computational burden occasioned by group signature's expensive public key operations resulting in unbearable authentication latency. This paper presented two authenticators: a signature–based authenticator and a message authentication code–based authenticator. These models are based on the Canetti-Krawczyk model. The proposed authenticators were implemented using Java 8 on Android Studio 2.2 and tested on Genymotion based emulator on Oracle VM VirtualBox. The experiment result showed a significant reduction in the authentication time when message authentication code–based authenticator was executed compared to authentication time result in the group signature–based authenticator. A further comparison of the model was compared with a similar model and find that ours was superior in efficiency measured from authentication latency when a user roams from his home domain to a visited network and other networks subsequently while maintaining same security characteristics.
Publication Title Development of a Prioritized Scheduling Algorithm for Congestion Management in Long Term Evolution
Publication Type conference
Publisher Proceedings of the World Congress on Engineering and Computer Science 2016 Vol I WCECS 2016, October 19-21, 2016, San Francisco, USA
Publication Authors Kuboye B. M, Adewale O. S., Alowolodu O. D. and Damilola E. O.
Year Published 2018
Abstract These instructions give you guidelines for preparing pap The surfacing of a Long Term Evolution (LTE) in a mobile networks environment was welcomed by the public due to its promising high speed and capacity in both voice and internet services. The number of subscribers to this network continues to increase daily thereby giving rise to congestion on the scarce resources available for allocation to the subscribers. Scheduling is one of the methods that that can be employed to mitigate the congestion on the network; as a result, several scheduling algorithms on the management of Radio Blocks (RBs) in LTE Networks were studied. Thereafter, a new prioritized algorithm was designed and simulated using Simulink in MATLAB. The results were compared to Best CQI and Round Robin. The proposed algorithm showed promising statistics in comparison with the Best CQI and Round Robin algorithms in terms of throughput and resource block allocation fairness.
Publication Title Post-Quantum Crystography based Security Framework for Cloud Computing
Publication Type journal
Publisher Journal of Internet Technology and Secured Transactions (JITST), Volume 4, Issue 1, March 2015
Publication Authors Gabriel A.J., Alese B.K, Gabriel A.J., Alese B.K
Year Published 2015
Abstract Crystography, which is the combination of Cryptography and Steganography could be a suitable “tool†for enhancing the security of communications and/or computations over the cloud. Most existing Crystographic systems are based on Public key Cryptographic schemes like RSA and Elliptic Curve Cryptography (ECC), whose security depends on the difficulty of solving Integer Factorisation Problem (IFP) and Discrete Logarithm problem (DLP) respectively. However, techniques for solving IFP and DLP problems, improves continually. Therefore, the existence of Quantum Computers in the range of 1000 bits would be a real world threat to systems based on those problems. This paper thus propose a new Crystographic System that combines Post Quantum Cryptography with Steganography to ensure that security of cloud communication is maintained both in Classical Computing era as well as Post-Quantum Computing era
Publication Title ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY
Publication Type journal
Publisher Journal of Internet Technology and Secured Transactions (JITST), Volume 4, Issue 1, March 2015
Paper Link www.computerscijournal.org
Publication Authors TOBORE IGBE, bOLANLE OJOKOH and OLUMIDE ADEWALE
Year Published 2016
Abstract Social networking website creates new ways for engaging people belonging to different communities, moral and social values to communicate and share valuable knowledge, therefore creating a large amount of data. The importance of mining social media cannot be over emphasized, due to significant information that are revealed which can be applied in different areas. In this paper, a systematic approach for traversing the content of weblog, considering location and time (spatiotemporal) is proposed. The proposed model is capable of searching for subjects in social media using Boyer Moore Horspool (BMH) algorithm with respect to location and time. BMH is an efficient string searching algorithm, where the search is done in such a way that every character in the text needs not to be checked and some characters can be skipped without missing the subject occurrence. Semantic analysis was carried out on the subject by computing the mean occurrence of the subject with the corresponding predicate and object from the total occurrence of the subject. Experiments were carried out on two datasets: the first category was crawled from twitter website from September to October 2014 and the second category was obtained from spinn3r dataset made available through the International AAAI (Association for the Advancement of Artificial Intelligence) Conference on Web and Social Media (ICWSM). The results obtained from tracking some subjects such as Islam and Obama shows that the mean occurrence of the analysis of the subject successfully reveals the pattern of the subject over a period of time for a specific location. Evaluation of the system which is based on performance and functionality reveals that the model performs better than some baseline models. The proposed model is capable of revealing spatiotemporal pattern for a subject, and can be applied in any area where spatiotemporal factor is to be considered.
Publication Title A Survey on Mobile Cloud Computing with Embedded Security Considerations
Publication Type journal
Publisher International Journal of Cloud Computing and Services Science (IJ-CLOSER) Vol.3, No.1, February 2014, pp. 53~66
Publication Authors *Waziri Onomza Victor,Joshua Abah, Olumide Sunday Adewale, Muhammad Bashir Abdullahi, Arthur Ume
Year Published 2014
Abstract The emergence of cloud computing hold a promise to computing where software is provided as a services (SaaS) via the Internet. Mobile cloud
computing integrates cloud computing with mobile devices. By this architecture, certain challenges (e.g. battery life, storage, and bandwidth) of mobile devices are addressed. Cloud computing provides the foundation for
mobile cloud computing through the delivery of services, software, storage
and computational capacity over the Internet, thereby reducing cost, increasing storage, improving battery life of mobile devices and providing flexibility and mobility of data and information. However, the realization of
some of these benefits is far from reality in mobile applications, as a result,
opens new areas of research such as security of privacy and services. To better understand how to facilitate the development of mobile cloud computing, we surveyed existing work in mobile cloud computing in the context and principles of its foundational cloud computing technology. We provided a definition of mobile cloud computing and gave a summary of results from this review, in particular, the models, architecture, applications and challenges of mobile cloud computing. We concluded with recommendations for how this better understanding of mobile cloud computing can assist in the development of better and stronger mobile
applications.
Publication Title Deployment of Multicriteria Decision System for National Youth Service Corps (NYSC)
Publication Type journal
Publisher Int. J. Advanced Networking and Applications Volume: 04 Issue: 06 Pages:1766-1771 (2013) ISSN : 0975-0290
Publication Authors Afolayan A. Obiniyi, Christiana N. Anujeonye, Olumide S. Adewale
Year Published 2013
Abstract National Youth Service Corps deployment programme is the process of deploying corps members to their places of
primary assignment. This paper focused on the use of multicriteria decision system for deployment exercise of corps members to their places of primary assignment instead of manual method. The model was developed using corps
membersà disciplines, genders and tribes among others and requests from organisations. The Multicriteria decision system
was implemented using Windows, Apache, MySQL and Hypertext Preprocessor (PHP) Apache as the web server, PHP as script language, MySQL as the relational database system with windows as operating system and it made use of a single client called the web browser. It is expected that the Multicriteria decision system will increase the efficiency, accuracy and timely posting of the Corps members and that the National youth service corps official should implement the use of the system for their deployment exercise.
Publication Title A Mechanism for Detecting Dead URLs in XTM-based Ontology Repository
Publication Type journal
Publisher International Journal of Computer Applications (0975 – 8887) Volume 111 – No 12, February 2015
Publication Authors Enesi Femi Aminu, Olumide S. Adewale
Year Published 2015
Abstract It is a common knowledge in this current age that the challenge is no more the availability of information but
accessing the appropriate information. This challenge is
attributed to the fact that information is highly unstructured. An innovative technology called XML Topic Map (XTM) is used to address the challenge. However, the technology is equally associated with an issue known as dead links as a
result of lack of maintenance which causes a lot of time
wastage thereby making the technology not very effective.
Therefore, this paper presents an XTM-based system using
News domain as case study to solve the issue of dead links. The system is a three-tier architecture implemented with Java Server Pages (JSP). The study offers a time saving system that would assist user to identify URLs that are dead in XTM-based applications as soon as user access topic.
Publication Title Network buffers The BSD, Unix SVR4 and Linux approaches (BSD4.4,SVR4.2,Linux2.6.2)
Publication Type others
Publisher SISSA - Trieste
Publication Authors Roberto Innocente, Olumide S. Adewale
Year Published 2003
Abstract On many operating systems, network buffers are a special category of buffers to be used for network opera-
tions. This is because they are used in a peculiar way and there is a need to make the most common of
those operations extremely efficient. Most of the network operations result in :
• addition or stripping of headers or trailers
• transfer of data to/from devices
• joining or splitting buffers
According to Gilder’s law, an empirical law recently being cited very often, the total communication band-
width triples every twelve months. In contrast, according to Moore’s law, cpu performance only doubles
ev ery 18 months. This will create an increasing gap between network and cpu performance.
We analyze how the traditional in-kernel networking is performed on 3 major network stacks : Bsd Unix,
Unix SystemV and Linux, looking for possible improvements.
This area has recently seen the emerging of new software paradigms (User Level Networking), to keep up
with the performance improvement of communications.
User-level networking givesaboost of performance pinning down some user memory where network cards
perform directly their I/O operations and memory connected network cards, provide the protection mecha-
nism by the standard page protection mechanism that most processors have.
Publication Title MODELLING UNIVERSITY STUDENTS’ ACADEMIC RECORDS USING ARTIFICIAL NEURAL NETWORKS
Publication Type journal
Publisher Journal of League of Researchers in Nigeria, 8(2):54–62
Publication Authors B.Y. Baha, O. S. Adewale, and N. V. Blamah
Year Published 2007
Abstract The time slice and money allocated for processing students’ results are overwhelming and yet students’ record system has persistent problems. The presence of uncontrolled
redundancy and dependence of data; lack of jurisdiction over the operational data;
inconsistency and lack of proper accessibility to students’ data are some of the inherent problems with students’ academic record. The use of artificial neural networks (ANN) in modelling using university students’ academic records (USAR) has been studied. Related literatures on using ANN, students’ academic records have also been reviewed.
The activity and use case diagrams of unified modelling language (UML) were used to
document the findings. A model based on ANN was developed for USAR.
Publication Title Digital Distance Education System based on Digital Video and Multimedia System. In: Restoring Confidence in Nigerian Education System in the year 2010 and Beyond
Publication Type others
Publisher GOAD Educational Publishers, Nigeria
Publication Authors Adewale O. S. and Falaki S. O.
Year Published 2015
Abstract The book chapter proposed a general overview of a distance learning system architecture. The proposed system is feasible today and equally relevant not only to distance learning applications, but also to video-on-demand services.
Publication Title An analytical framework for vision testing in driving license allocation in Nigeria
Publication Type journal
Publisher International Journal of Computer Applications 97(4): 34-38.
Paper Link https://doi.org/10.5120/16998-7156
Publication Authors Adewale O. S., Ogundele O. S. and Iyare O.
Year Published 2006
Abstract Allocation of Driving Licensing in Nigeria in the past was done haphazardly and as a result of drivers with poor driving culture were usually allocated driving license. This probably was followed by unprecedented wave of road traffic accidents with attendant human and material losses. In other to reduce these losses, the federal road safety commission at its inception introduced some measures to curb the issue of licensing. This work, in line with the technological trend proposed an automated licensing scheme to improve on the efficiency of the previous system. The system was tested with 50 applicants and the result presented.
Publication Title Naïve Bayes for intrusion detection and discretisation effect on its performance
Publication Type journal
Publisher Journal of Research in Physical Sciences, 4(4):53–58
Paper Link nil
Publication Authors Adetunmbi A. O.; Alese B. K. and Adewale O. S.
Year Published 2008
Abstract In this paper, naive Bayes was used in building an intrusion detection model in classifying network connections into four attack groups: DOS, Probe, R2L and U2R and normal. The experimental study was carried out on KDD ’99 intrusion detection datasets. It was discovered that the performance of naive Byes depends on discretisation techniques used.
Publication Title Towards a Sustainable Agricultural Development in Nigeria: Taking advantage of distance education and eLearning, Anchored on Information and Communication Technology
Publication Type journal
Publisher CSREA EEE 2008:519–525
Paper Link nil
Publication Authors Akinyede R. O., Adewale O. S. and Boyinbode O. K.
Year Published 2008
Abstract nil
Publication Title Deadlock detection in agent-based virtual knowledge communities, Annals
Publication Type journal
Publisher Computer Science Series, 8(2)
Paper Link nil
Publication Authors Ogunleye G. O., Adewale O. S., Adetunmbi A. O., Ogunde A. O. and B. K. Alese
Year Published 2010
Abstract knowledge communities (VKC), shadow and detector agents were used to facilitate the detection process in the design. A mathematical model based on the design for deadlock detection and resolution in multi-agent communities was developed. The prototype implementation was carried out using Java platform technology. Experimental result is satisfactory in addressing the issue of deadlock problem in knowledge sharing in agent–based VKC.
Publication Title Towards an agent-based customer knowledge management system (ABCKMS) in e-commerce organisations
Publication Type journal
Publisher International Journal on Computer Science and Engineering, 2(6):2181-2186,
Paper Link https://www.academia.edu/58031481
Publication Authors Ogunde A. O., Folorunso O., Adewale O. S., Ogunleye G. O. And Ajayi A. O
Year Published 2010
Abstract Till date, e-commerce organisations still have competency challenges in customer knowledge Management (CKM). Organisations need to develop competencies in all aspects of CKM, from understanding who their customers really are and what they want, to designing platforms specifically for customers. It is particularly important for customer processes involving information for, collected from and about customers to be turned into knowledge, disseminated and really used. Also, most companies do not always take full advantage of the knowledge sources that exist through customers’ interaction with their websites. All these processes appear complex and fuzzy, which the introduction of agent technology in this paper poses a potential solution to this problem, in order to achieve an effective CKM in a dynamic business environment as e-commerce organisations.
Publication Title Development of models for managing network congestion on global system for mobile communication (GSM) in Nigeria
Publication Type journal
Publisher Journal of Wireless Networking and Communications, 1(1):8–15.
Paper Link https://doi.org/10.5923/j.jwnc.20110101.02
Publication Authors Kuboye B. M., Alese B. K., Fajuyigbe O. and Adewale O. S.
Year Published 2011
Abstract Unexpectedly, the level of patronage being experienced in Global System for Mobile Communication (GSM) in Nigeria is overwhelming. This is as a result of freedom of calling from anywhere, anytime and clarity of the voice enjoyed in GSM since it is on a digital technology platform. This has brought a lot of congestion in the network resulting in poor services by the operators. This research proposes a management algorithm for the management of the congestion experienced in the GSM network in Nigeria. It explores the use of Erlang-B in determining the appropriate probability level for some range of subscribers. Thereafter, when there is congestion, block time sharing, dynamic allocation without time slicing, dynamic allocation time slicing with signal sensing, frequently recent call allocation, and priority allocation algorithms were developed to manage the congestion. Furthermore, a hybrid algorithm was developed that integrates all the algorithms together in other to manage the congestion considering all the strengths and constraints of each algorithm. If the recommended congestion management algorithm is followed comprehensibly, the congestion problem on the GSM network will be reduced drastically.
Publication Title Improving web search with the EWEBSEARCH model
Publication Type journal
Publisher International Journal of Applied Information Systems
Paper Link https://doi.org/10.5120/ijais12-450498
Publication Authors Abur, M. M., Adewale O. S., Hammawa M. B., Soroyewun M. B
Year Published 2012
Abstract Traditional web which is the largest information database lacks semantic and as a result the information available in the web is only human understandable, not by machine. With the rapid increase in the amount of information on networks, search engine has become the infrastructure for people gaining access to Web information, and is the second largest Internet application besides e-mail. However, search engine returns a huge number of results, and the relevance between results and user queries is also different. There are lots of search engines available today, but the way to retrieve meaningful information is difficult. To overcome this problem in search engines to retrieve meaningful information intelligently or smartly, Semantic Web technology has played a major role. In the light of this, this paper proposes an algorithm, architecture for the semantic web–based search engine model powered by XML meta-tags (which ensures machine understandability) to improve web search. The model provides a simple interface to capture user's queries (keywords), then the search or query engine processes the queries from the repository (database) using the search engine algorithm, interpreting the queries, retrieving and providing appropriate ranking of results in order to satisfy users queries. Query answers are ranked using extended information-retrieval techniques, are generated in an order of ranking and implementation of the model.
Publication Title Probabilistic credit card fraud detection system in online transactions
Publication Type journal
Publisher International Journal of Software Engineering and Its Applications, 6(4):69–78
Paper Link https://www.academia.edu/39140084
Publication Authors Falaki S. O., Alese B. K., Adewale O. S. Ayeni J. O., Aderounmu G. A. and Ismaila W. O
Year Published 2012
Abstract This paper discussed the past works on fraud detection system and highlights their deficiencies. A probabilistic based model was proposed to serve as a basis for mathematical derivation for adaptive threshold algorithm for detecting anomaly transactions. The model was optimized with Baum-Welsh and hybrid posterior-Viterbi algorithms. A credit card transactional data was simulated, trained and predicted for fraud. And finally, the proposed model was evaluated with different metric. The results showed that with the optimisation of parameters, posterior-Viterbi cum new detection model performed better than Viterbi cum old detection model.
Publication Title Identity management system in Nigeria (IDM): prospects and challenges
Publication Type journal
Publisher Journal of Emerging Trends in Engineering and Applied Sciences, 4(3):513-521
Paper Link nil
Publication Authors Adeola S. O.; Falaki S. O.; Adewale O. S. and Adetunmbi A. O.
Year Published 2013
Abstract Identity management is a critical issue in economic and socio-political well-being of any nation. A nation that cannot boast of knowing her citizens is devoid of peace, economic stability and would not be able to provide adequate security for its citizenries. The recent surge in crime in Nigeria and the attendance violent activities of terrorists demand that more attention be paid to identifying people living in the nation territory. There have been speculations that those responsible for recent wake of bombing activities in Nigeria are foreigners from neighbouring
Publication Title Effect of linear curved wavelet paths in seismic oil exploration over Kukawa axios, Borno State, Nigeria
Publication Type journal
Publisher International Journal of Engineering Research and Technology, 2(6): 2925-2930
Paper Link nil
Publication Authors Mbang U. B.; Alese B. K., Adewale O. S. and Enikanselu P. A.
Year Published 2013
Abstract instead of the ideal curved wave path is undertaken. The study entailed a comparison of the actual depths calculated by the use of straight–line paths with those computed with curved paths which are both determined by the reflection time of a wave from surface to the target bed as well as the velocity of propagation. The strategy adopted in this study was based on the results of an earlier research which made the comparison to be rather between the height (h) obtained by actual measurements and (h’) obtained by the assumption of a straight–line path. Results obtained show that the use of straight lines instead of curved paths introduced an average percentage error of 0.07 which is not significant in terms of the precision of seismic exploration results obtained between 1976–1996 in Kukawa, Borno state, Nigeria.
Publication Title Treatment strategies for the effluents of recycled waste paper mills of Punjab
Publication Type journal
Publisher Journal of Emerging Trends in Engineering and Applied Sciences
Paper Link nil
Publication Authors Adeola S. O., S. O. Falaki, Adewale O. S. and Adetunmbi A. O
Year Published 2013
Abstract Recycled paper industry is a globally growing industry that consumes a significant amount of resources, raw materials and energy. Due to this fact, minimising the environmental impact of this sector is important. The characteristics of the waste waters generated from various processes of the recycled pulp and paper industry depend upon the types of processes and raw materials, process technology applied, management practices, internal recirculation of the effluent for recovery and the amount of water being used in a particular process. One of the main causes of surface water and ground water contamination is industrial discharge from various industries viz. pulp and paper, textile, pharmaceutical and other chemical industries. These compounds are quite toxic and degrade slowly in the environment. Therefore, it becomes imperative to completely degrade these organic compounds. The incapability of conventional waste water treatment methods to effectively remove many bio-recalcitrant pollutants leads to explore the new efficient and cost–effective treatment systems for the complete degradation of these pollutants. One relevant method is oxidation, and especially the so-called advanced oxidation process (AOP) which consists of the strong action of oxidizing agents, resulting in the generation of very highly reactive hydroxyl radicals. The present study determines the status of the environment pollutants of the effluents of recycled paper and pulp mills and the strategies to remove the organic load. The goal of the study is to evaluate the best effective treatment which can effectively degrade the pollutants present in waste streams. The results show that the best results are obtained using a combined FeSO4.7H2O and CaCO3 processes, with more than 27% degradation of effluents and 55% removal of COD.
Publication Title Generating recommendation status of electronic products from Online Reviews
Publication Type journal
Publisher Intelligent Control and Automation, 4:1-10
Paper Link http://dx.doi.org/10.4236/ica.2013.41001
Publication Authors Ojokoh B. A., Olayemi O. C. and Adewale O. S
Year Published 2013
Abstract The need for effective and efficient mining of online reviews cannot be overemphasized. This position is as a result of the overwhelmingly large number of reviews available online which makes it cumbersome for customers to read through all of them. Hence, the need for online web review mining system which will help customers as well as manufacturers read through a large number of reviews and provide a quick description and summary of the performance of the product. This will assist the customer make better and quick decision, and also help manufacturers improve their products and services. This paper describes a research work that focuses on mining the opinions expressed on some electronic products, providing ranks or ratings for the features, with the aim of summarising them and making recommendations to potential customers for better online shopping. A technique is also proposed for scoring segments with infrequent features. The evaluation results using laptops demonstrate the effectiveness of these techniques.
Publication Title Development of a text-dependent speaker recognition system
Publication Type journal
Publisher International Journal of Computer Applications 69(16):1–7
Paper Link https://doi.org/10.5120/12043-7021
Publication Authors Aliyu E. O., Adewale O. S. and Adetunmbi A. O
Year Published 2013
Abstract Speaker recognition is the ability of recognising a person based on his voice. Many modalities and techniques have been applied to achieve the task of authentication, ranging from retina scans to finger prints. This paper presents a text-dependent model for automatic speaker recognition. Features extraction is based on Mel-Frequency Cepstrum Coefficients (MFCCs) and Linear Predictive Coding (LPC) analysis technique which aids the translation of incoming speech into a feature value. Also, a recogniser block, employs the two techniques (MFCC and LPC) to get hybrid features for speaker identification/verification system. An experiment was carried out on the threshold from 75% to 95% at 5% differential to know the performance of the MFCCs and LPC identification/verification system. From the experiment carried out, the result shows that LPC outperforms MFCCs and a combination. The text-dependent speaker recognition system was implemented using Java Programming Language (Java Speech Application Programming Interface (JSAPI)). The system is developed for access control into computer systems and could be used for access control where security is considered to be of utmost important.
Publication Title Integrated e-learning system (IES) for the Nigeria universities: an architectural overview
Publication Type journal
Publisher American Journal of Database Theory and Application 2013, 2(1): 1-8.
Publication Authors Adeola O. S., Adewale O. S and Alese B. K
Year Published 2013
Abstract It is no longer news that the standard of education in the third world countries is fast falling. Nigeria is not an exception. This may not be unconnected with human factors, infrastructural decay and government lackadaisical attitude in tackling the problems in the education sector. Many universities especially the recently established ones can boast of very few experienced lecturers. The economic crisis in the country coupled with poor remuneration for teachers has contributed in no small measure to brain drain in the system. The challenge therefore is to optimize the little ‘brain’ that is left for the benefit of all students across the whole countries as opposed to the current trend of localizing the lecturers. This paper discusses e-learning, examines the challenges and prospect of e-learning paradigm and proposes an integrated e-learning system architecture for the purpose of sharing the knowledge of few experts and professional still remaining in the universities system.
Publication Title A mobile-based e-learning system, International Journal of Web-Based Learning and Teaching Technologies
Publication Type journal
Publisher International Journal of Web-Based Learning and Teaching Technologies, 8(3), 1–17
Paper Link https://doi.org/10.4018/ijwltt.2013070101
Publication Authors Ojokoh B. A., Doyeni O. A., Adewale O. S. and Isinkaye F. O.
Year Published 2013
Abstract learner-centred interactive learning environments by utilising internet and digital technologies with respect to instructional design principles. This paper presents an application of software development technique in the development of a mobile–based e-learning system that facilitates learning in a university environment. The developed application presents a system where a student after registration, has access to various functions that can improve the process of learning. Web pages were developed to serve as the user interface to the MLS and provide all the services needed for an e-learning portal including assessment and provision of feedback to learners. A portal exists for lecturers to upload learning contents and students’ examination results. The online portal uses Apache HTTP server as its web server, MySQL for relational database management and PHP as the scripting language to serve as a communication gateway between the back end and the users. The system was tested and evaluated with satisfactory results. This work, if adopted in schools to aid conventional learning, is expected to immensely improve the learning process and performance of students.
Publication Title Effect of hybrid hidden Markov models algorithms in fraud detection system
Publication Type journal
Publisher International Journal of Scientific Innovations and Sustainable Development, 3(1):96–101
Paper Link nil
Publication Authors Falaki S. O.; Ayeni J. O.; Alese B. K.; Adewale O. S., Aderounmu G. A.
Year Published 2013
Abstract nil
Publication Title A Framework for Effective Management of Intellectual Assets: A Case for Digital Repositories in Nigeria
Publication Type journal
Publisher Scottish Journal of Arts, Social Sciences and Scientific Studies, 9(2):25–36
Paper Link nil
Publication Authors Ibidunmoye E.O. and Adewale O. S.
Year Published 2013
Abstract A digital repository is an organisation whose mission is to continuously store, manage, and disseminate digital assets and resources in a distributed manner to designated community. The paper explores the concepts of digital repository and repository standards such as the Open Archival Information System (OAIS), and popular metadata schemes. The paper also looks at related systems in Nigeria and elsewhere with a view to providing an ideal system for institutions in developing countries such as Nigeria. The paper proposes a framework (according to the ISO OAIS 14721:2003 reference model) for managing intellectual assets to primarily serve staffs, students and secondarily the wider academic and local community. The proposed framework was implemented the system using Computer Science department, Federal University of Technology, Akure. Nigeria, as a case study. The proposed framework will further enhance teaching and research in academic institutions leading to enhanced knowledge sharing and collaboration among staff, students and the larger community.
Publication Title Protecting legitimate software users’ interest in designing a piracy prevention technique on computer network
Publication Type journal
Publisher Network and Complex Systems, 3(5).
Paper Link nil
Publication Authors Adu M. K., Alese B. K., Adewale, O. S., Adetunmbi, A. O.
Year Published 2013
Abstract This paper is an attempt to substantiate the fact that socio-economic issue has to be put into consideration in any effort at preventing software piracy. A legitimate software owner must be given certain period of grace to cater for unforeseen contingencies during which re-installation is allowed without being counted against him. A mathematical equation - TUSRUC EQUATION (Time Usage of Software in Respect of Unforeseen Contingencies) is presented as an algorithmic function, which shows the way the system handles cases of unforeseen contingencies during the “first time†period of using a software product. These unforeseen contingencies can include the following and not limited to; reformatting of a system, sudden virus attack, system hardware damage.
Publication Title Elliptic curve cryptography for securing cloud computing applications
Publication Type journal
Publisher International Journal of Computer Applications, 66(23):10–17.
Paper Link https://doi.org/10.5120/11254-5818
Publication Authors International Journal of Computer Applications, 66(23):10–17.
Year Published 2013
Abstract Computing applications and data are growing so rapidly that increasingly larger servers and data centre are needed for fast processing within the required time. A fundamental shift in the way information technology and computing services are being delivered and purchased results in the development of cloud computing. The out of control cost of power in terms of electricity generation, personnel hardware and limited spaces in data centres have encouraged a significant number of enterprises to move more infrastructures into a third party provided cloud. However, cloud computing requires that organisations trust that a service provider’s platforms are secured and provide a sufficient level of integrity for the client’s data. This paper proposed an elliptic curve cryptography scheme as a secure tool to model a secured platform for the cloud application.
Publication Title Secured banking operations with face-based automated teller machine
Publication Type journal
Publisher International Journal of Innovative Science, Engineering & Technology, 1(10): 584–592,
Paper Link https://www.academia.edu/11747417
Publication Authors International Journal of Innovative Science, Engineering & Technology, 1(10): 584–592
Year Published 2014
Abstract Scotland which operates without a card or authentication by entering Personal Identification Number (PIN) to withdraw cash up to £100, a more secured ATM can be designed and implemented with more secured feature of biometrics- facial recognition as PIN. Security is an indispensable issue in banking operations; with the advent of technology such as e-banking, mobile banking etc. security has become an issue that needs utmost paramount. Principal Component Analysis are employed in face recognition system, it seeks to capture the variations in a collection of face images and use them to encode and compare images of individual faces by using statistical dimensionality reduction method to produce the optimal linear squares decomposition of a training set and eigenfaces. This research would afford the entire society more reliable ATM model and incidence of fraud which have decline the customer confidence on ATMs would be obliterated.
Publication Title Performance Evaluation and Modelling of Internet Traffic of an Academic Institution: a case study of the Federal University of Technology, Akure, Ondo State, Nigeria
Publication Type journal
Publisher Nigerian Journal of Technological Research 9(2).
Paper Link https://doi.org/10.4314/njtr.v9i2.10
Publication Authors Dahunsi F., M., Mebawondu J. O. and Adewale O. S.
Year Published 2014
Abstract Academic institutions require internet services to facilitate research and learning processes for the students and members of staff. More so, the Federal University of Technology, Akure, a technologically oriented institution, deserves viable internet services for these purposes. Optimal performance and continual delivery of adequate service to users would be enhanced by evaluating the performance of the existing internet. This study presents results of finding on the performance of internet service in the university with special reference to parameters such as number of users, protocols used, bytes used, uptime and downtime and dropped packets. Traffic data flows were experimentally captured and measured over a period using relevant measuring tools. The results presented summarize the performance of the university network and recommendations needed to enhance optimal performance, available and adequate service to all users.
Publication Title Infrared Capture of Palm-Vein Blood Vessel Patterns for Human Authentication
Publication Type journal
Publisher Journal of Internet Technology and Secured Transactions, 3(1):203–209
Publication Authors Akinsowon O., Boniface Alese B., Adewale O.
Year Published 2014
Abstract Biometric Technology is fast taking over from the conventional use of ID Cards, PINs, Tokens and Passwords. This is becoming essential because of the issues of forgotten passwords, stolen ID Cards, compromised tokens and spoofed PINs. Palm-print authentication for access control has been deployed in so many areas of security concern in developing countries. This paper evaluates the stages involved in the processing of palm-print images for identification or human authentication. It focuses on the feature extraction stage which is where the required features are separated from the others.
Publication Title Performance analysis of a prioritised multilevel access allocation scheme for data calls in GSM networks
Publication Type journal
Publisher International Journal of Computer Applications, 97(1):1-6.
Paper Link https://doi.org/10.5120/16968-6533
Publication Authors Kuboye B. M., Alese B. K., Falaki S. O. and Adewale O. S.
Year Published 2014
Abstract The demand of voice and data services on the Global System for Mobile Communications (GSM) is unprecedented in the annals of the history of telecommunication systems. As a result, grade of service is no longer stable in the face of this high demand. This paper explores the use of prioritised multilevel access allocation scheme to stem the instability of data services when there is high demand. This paper classifies calls into Handover (HD), Real-Time (RT) and Non-Real-Time (NRT) based on the nature of their service and thereafter, priority was set among them. The HD has the highest priority followed by RT and NRT respectively. The channels in the cell were partitioned into three pools named as q1, q2, and q3. Data and voice calls have different characteristics. Therefore, voice always have priority over data since it cannot tolerate delay in call processing. The q1 is reserved for voice only, q3 reserved for data only while q3 is reserved for handoff calls for both voice and data.
Publication Title Improving deception capability in honeynet through data manipulation
Publication Type journal
Publisher Journal of Internet Technology and Secured Transactions, 4(2):373–379.
Publication Authors Akingbola R. A., Dahunsi F. M., Alese B. K., Adewale O. S., Ogundele T. J.
Year Published 2015
Abstract Emergence of honeynet, which is a network of honeypots, has changed the phase of internet security and information gathering about intruders. In improving deception of the honeynet which in turn increases the workload of attackers, most honeynet deployments are geared towards improving on the deception deal by using MAC addresses, IP addresses and protocols on host machine. Attackers gain access to networks with different motives. This paper focuses on attackers for data theft, data insertion, data deletion and data modification. This paper also includes data manipulation, a new component introduced by the users of these hosts. This data content contributes to improving deception by dynamically sorting, shuffling, updating, manipulating and mapping each last modified state of the data to unique MAC/IP addresses of an intruder machine that modified the system.
Publication Title Variabilities in ontology-driven and rule-based system for management and pricing of family of products
Publication Type journal
Publisher International Journal of Computer Science and Network, 4(1):1–7
Paper Link nil
Publication Authors Oladoja I. P., Adewale O. S., Adesuyi A. T. and Fakoya T
Year Published 2015
Abstract The increasing amount of variability in software systems led to a situation where the complexity of variability management becomes a primary concern during software development. Variability has been recognized as the key to systematic and successful reuse. In family-based approaches, like software product families, variability is a means to handle the inevitable differences amongst systems in the family while exploiting the commonalities and thus increases the reusability of software. This paper presented a model for creating variability of family of products of mobile phones, using ontology web language semantic technology, to address the need of minimising the cost of a new software development. The proposed model allows the reuse of components to assemble a new product. An ontology was built for Phone X family using resource description framework schema. The variability design was implemented using ASP.Net and C# programming language. The result showed that the model was able to produce phones, each with different components options.
Publication Title Ontology-Based Model for e-Learning Management System (O-BMEMS)
Publication Type journal
Publisher International Journal of Computer Science Issues, 12(3):118–126
Paper Link nil
Publication Authors Fakoya J. T., Adewale O. S. and Oladoja I. P.
Year Published 2015
Abstract The increasing amount of variability in software systems led to a situation where the complexity of variability management becomes a primary concern during software development. Variability has been recognized as the key to systematic and successful reuse. In family-based approaches, like software product families, variability is a means to handle the inevitable differences amongst systems in the family while exploiting the commonalities and thus increases the reusability of software. This paper presented a model for creating variability of family of products of mobile phones, using ontology web language semantic technology, to address the need of minimising the cost of a new software development. The proposed model allows the reuse of components to assemble a new product. An ontology was built for Phone X family using resource description framework schema. The variability design was implemented using ASP.Net and C# programming language. The result showed that the model was able to produce phones, each with different components options.
Publication Title Multi-level access priority channel allocation with time threshold in global system for mobile communications (GSM) networks
Publication Type journal
Publisher International Journal of Information Technology and Computer Science, 11:17–28.
Paper Link https://doi.org/10.5815/ijitcs.2015.11.03
Publication Authors Kuboye B. M., Alese B. K. Adewale O. S. and Falaki S. O
Year Published 2015
Abstract minimised. The voice calls are broken into sub-classes of services and a level of priority is established among the classes so that the most urgent and important service will have access to the channel by pre–empting the lower priority services during congestion. The voice communications over the GSM network using the different classes of subscribers were analysed with Markov chain’s model. The steady state probabilities for voice services were derived. The blocking and dropping probabilities models for the different services were developed using the Multi-dimensional Erlang B. To give a new call a fair sharing of the channel, Time-Threshold scheme is employed. This scheme classifies handoff call as either prioritised call or new call according to its associated elapsed real time value. The models were implemented based on the blocking and dropping probabilities models to show how the congestion can be minimised for different subscribers based on their priority levels. The work shows that the models used gave significant reduction in congestion when compared to the traditional Erlang-B model used in GSM.
Publication Title Threshold-based bandwidth allocation scheme for multiservice wireless networks
Publication Type journal
Publisher Journal of Computer Science and Its Application, 22(1)
Paper Link nil
Publication Authors Oladele O. T., R. O. Oladele R. O., and Adewale O. S.
Year Published 2015
Abstract minimised. The voice calls are broken into sub-classes of services and a level of priority is established among the classes so that the most urgent and important service will have access to the channel by pre–empting the lower priority services during congestion. The voice communications over the GSM network using the different classes of subscribers were analysed with Markov chain’s model. The steady state probabilities for voice services were derived. The blocking and dropping probabilities models for the different services were developed using the Multi-dimensional Erlang B. To give a new call a fair sharing of the channel, Time-Threshold scheme is employed. This scheme classifies handoff call as either prioritised call or new call according to its associated elapsed real time value. The models were implemented based on the blocking and dropping probabilities models to show how the congestion can be minimised for different subscribers based on their priority levels. The work shows that the models used gave significant reduction in congestion when compared to the traditional Erlang-B model used in GSM.
Publication Title Discovering Spatio-temporal patterns of themes in social media
Publication Type journal
Publisher Oriental Journal of Computer Science & Technology, 9(3):165–176.
Paper Link http://dx.doi.org/10.13005/ojcst/09.03.02
Publication Authors Igbe T., Ojokoh B. and Adewale O.
Year Published 2015
Abstract Social networking website creates new ways for engaging people belonging to different communities, moral and social values to communicate and share valuable knowledge, therefore creating a large amount of data. The importance of mining social media cannot be over emphasized, due to significant information that are revealed which can be applied in different areas. In this paper, a systematic approach for traversing the content of weblog, considering location and time (spatiotemporal) is proposed. The proposed model is capable of searching for subjects in social media using Boyer Moore Horspool algorithm with respect to location and time. Semantic analysis was carried out on the subject by computing the mean occurrence of the subject with the corresponding predicate and object from the total occurrence of the subject. Experiments were carried out on two datasets: the first category was crawled from twitter website from September to October 2014 and the second category was obtained from spinn3r dataset. The results obtained from tracking some subjects such as Islam and Obama show that the mean occurrence of the analysis of the subject successfully reveals the pattern of the subject over a period of time for a specific location. Evaluation of the system which is based on performance and functionality reveals that the model performs better than some baseline models. The proposed model is capable of revealing spatiotemporal pattern for a subject, and can be applied in any area where spatiotemporal factor is to be considered.
Publication Title A framework of elearning system for students engagement with cognitive tasks to enhance learning performance
Publication Type journal
Publisher International Journal of Computer Applications
Paper Link https://doi.org/10.5120/17152-7203
Publication Authors Agbonifo O. C. and Adewale O. S
Year Published 2015
Abstract Social networking website creates new ways for engaging people belonging to different communities, moral and social values to communicate and share valuable knowledge, therefore creating a large amount of data. The importance of mining social media cannot be over emphasized, due to significant information that are revealed which can be applied in different areas. In this paper, a systematic approach for traversing the content of weblog, considering location and time (spatiotemporal) is proposed. The proposed model is capable of searching for subjects in social media using Boyer Moore Horspool algorithm with respect to location and time. Semantic analysis was carried out on the subject by computing the mean occurrence of the subject with the corresponding predicate and object from the total occurrence of the subject. Experiments were carried out on two datasets: the first category was crawled from twitter website from September to October 2014 and the second category was obtained from spinn3r dataset. The results obtained from tracking some subjects such as Islam and Obama show that the mean occurrence of the analysis of the subject successfully reveals the pattern of the subject over a period of time for a specific location. Evaluation of the system which is based on performance and functionality reveals that the model performs better than some baseline models. The proposed model is capable of revealing spatiotemporal pattern for a subject, and can be applied in any area where spatiotemporal factor is to be considered.
Publication Title Conceptual agent-based model for optimal power utilisation in wireless sensor networks
Publication Type journal
Publisher Acta Informatica Pragensia, 5(1):46-55
Paper Link https://doi.org/10.18267/j.aip.84
Publication Authors Adewale O. S., Egwuche O. S., and Oluwadare S. A.
Year Published 2015
Abstract Wireless Sensor Networks are densely and largely deployed in a variety of environments to sense real-world events. Many approaches have been proposed for collecting sensory data in any wireless sensor networks in a flexible, reliable, and efficient manner. This study proposes an efficient mobile agent-based model for data gathering in wireless sensor networks to achieve energy and timely collection of sensory information in the target scene. The nodes of the sensors are modelled and represented by the states of a Markov chain. The nodes are further grouped into clusters to save the energy of the nodes farther away from the base station.
Publication Title Securing Cardless Automated Teller Machine Transactions Using Bimodal Authentication System
Publication Type journal
Publisher Journal of Applied Security Research 11(4).
Publication Authors Ameh A. I., Olanyi O. M. and Adewale O. S.
Year Published 2015
Abstract In today's corporate environment, it is important to ensure that only authorized customers have access to offered services. With the availability of ready-to-use sniffers and access code hacking tools, the standard card and Personal Identification Number combination may no longer be sufficient to withstand the test of secure authentication. Additionally, the huge and recurrent card possession and repossession cost incurred by banks' customers, occasioned by card expiry, loss, theft, and damage is, agreeably, undesirable. In this article, a bimodal customer authentication system for a cardless Automated Teller Machine (ATM) was presented. The system employs the principle of eigenvectors and Euclidean distance for fingerprint verification. The Personal Identification Number (PIN), which serves as the second factor of authentication, is determined on account opening and hashed using the truncated SHA 512/256 Secure Hashing Algorithm. Analysis of the system performance shows genuine acceptance rates (1-FRR) from 98% and upwards, and equal error rates of 0.0065. A low standard deviation of 0.01 of the Average Matching Times (AMT) shows the consistency of the algorithm in processing the fingerprints. Therefore, the performance evaluation of the system using these metrics portrays the adequacy and suitability of the proposed system for ATM user authentication.
Publication Title Vehicle theft alert and location identification using GSM, GPS and web technologies
Publication Type journal
Publisher International Journal of Information Technology and Computer Science, 7:1–7.
Paper Link https://doi.org/10.5815/ijitcs.2016.07.01
Publication Authors Suleiman G., Shehu I. S., Adewale O. S., Abdullahi M. B. and Adepoju S. A.
Year Published 2015
Abstract Insecurity is one of the major challenges that the entire world is facing now, each country having their peculiar security issues. The crime rate in every part of the society these days has become a threatening issue such that vehicles are now used for committing criminal activities more than before. The issue of vehicle theft has increased tremendously, mostly at gunpoint or car parks. In view of these, there is a need for adequate records of stolen, identified and recovered vehicles which are not readily available in our society and as such very important. The paper presented a vehicle theft alert and location identification system for vehicle owners to ensure theft prevention and a speedy identification towards recovery efforts in situations where a vehicle is missing, stolen or driven by an unauthorized person. The theft alert function makes use of a GSM application developed and installed in a mobile phone device which is embedded in the vehicle to communicate with the vehicle owner’s mobile phone. The system was implemented using JAVA because of its capabilities in programming mobile applications while PHP and MySQL were used for the web application functions. Integration testing of the system was carried out using simple percentage calculation for the performance evaluation.
Publication Title Collaborative Activities Management System Model (CAMS) for Web-based Virtual Classrooms
Publication Type journal
Publisher Circulation in Computer Science 2(2):1-14
Paper Link https://doi.org/10.22632/ccs-2017-251-48
Publication Authors Ibam E. O., Agbonifo O. C. and Adewale O
Year Published 2017
Abstract learning systems. E-learning products that lack features for online collaboration among participants are deemed to be incomplete or sub-standard. Collaboration modules within an e-learning system consist of assets for group communication and work “spaces†and facilities. Activities within the collaborative framework of an e-learning system advances collaborative social interaction and the social construction of knowledge. Participants in an e-learning environment get involved in many activities which if not well coordinated could hamper collaboration instead of enhancing it. Therefore, the need to create measurable tools (models) that can coordinate these collaborative activities and provide up-to-date information or status of individual participant and group participants in collaborative activities within an e-learning environment has become inevitable. This paper presents the design of activities management system model for online collaborative learning systems. The model contains some mathematical models for determining the level of involvements of a participant or groups in online classes (class attendance), discussions, project and polls. Their levels of participation are assigned weights and their aggregate value interpreted to give up-to-date status of their involvement in collaborative activities. The model is implemented using WAMP tools.
Publication Title Design of a Fingerprint Biometric Authentication Technique for Electronic Examination
Publication Type journal
Publisher International Journal of Computer Science and Telecommunications, 8(2):8–15
Paper Link https://www.academia.edu/33257085
Publication Authors Ibrahim M. B., Othman A. U., Adewale O. S. and Balogun, B. F
Year Published 2017
Abstract The rapid growth of online examination using internet–based tools in lieu with increasing reliance on technology and other shared resources has revolutionised the way authentication is being initiated and carried out in this information age. The unprecedented growth in electronic examination (e–exams) has underlined the need for more secure, faster and more suitable method of user’s verification than passwords can provide. Despite, the numerous advantages of biometric systems and its impact on various sectors across the globe, most users still face the issue of defining the right and accurate biometrics technology system in solving particular problems. This paper addresses the issue of accuracy by proposing an image enhancement approach that incorporates SecuGen fingerprint in conjunction with electronic learning environments to curb unethical conducts associated with electronic examination in a university environment. Minutiae points which are one of the unique features of fingerprints were extracted using the crossing number concept by extracting the ridge endings and ridge bifurcations using the local neighbourhoods of a ridge pixel from a 3 x 3 window. At authentication stage, the fingerprint is captured again with the extracted features compared with the templates stored in the database to determine a match before a student can login to write an examination.
Publication Title An exploratory study of techniques for monitoring oil pipeline vandalism
Publication Type journal
Publisher Covenant Journal of Engineering Technology, 1(1):59-67
Paper Link nil
Publication Authors Yunana K., Adewale S. O., Alfa A. A. and Sanjay M
Year Published 2017
Abstract Wireless Sensor Networks are crucial substructure made up of microcontroller, sensing units and communication interfaces designed to enable the users possess the capability to measure, collect and responds to phenomenon within the surrounding been monitored. Wireless sensor networks are viewed as an edge between the physical and the virtual world. The demand of fluid transportation from the production point to the region of end users has led to an increase in the number of pipelines that are fabricated globally. Pipeline infrastructure is generally regarded by many countries as a key element for national development, therefore shielding and observing the pipeline is essential for a successful economy. The current techniques in pipeline monitoring and surveillance include visual inspection, the use of unmanned aircraft, ground penetrating radar, fibre cabling technology, and wireless sensor networks. This paper presents the various techniques, strengths and weaknesses when deployed for continuous monitoring of oil pipeline infrastructure.
Publication Title Schematic structure of national data harmonisation system for identity management
Publication Type journal
Publisher European Scientific Journal, 13(3):318 – 326.
Paper Link https://doi.org/10.19044/esj.2017.v13n3p318
Publication Authors Osuolale A. F., Adewale O. S. and Abimbola O. J.
Year Published 2017
Abstract Imagine a web-application in which a user can query varieties of information about an individual (like name, age, state of origin, driver’s license number, national identification number, etc.). This information would be stored on different databases, each having its own schema. Often times, these resources are replicated in different locations and on different platforms. Hence, the need for data harmonisation or integration. Data harmonisation addresses this issue by considering these external resources as materialised views over a virtual mediated schema resulting in “virtual data integrationâ€. When mediated schema is queried, the solution transforms the result into appropriate queries over the various and existing data sources. This paper focuses on data harmonisation that cuts across different governmental database and incorporating them all into a centralised view and this is possible as a result of development and implementation of a web-based databank application.
Publication Title Investigative analysis of cognitive radio wireless model for reconfiguration and adaptation capabilities
Publication Type journal
Publisher IOSR Journal of Mobile Computing & Application, 5(2):1-14.
Paper Link https://doi.org/10.9790/0050-05020114
Publication Authors Falaki S. O., Adewale O. S., Alese B. K. and Jinadu O. T.
Year Published 2018
Abstract Wireless networks have become constant in our everyday life due to ever increasing users and applications. With newer and sophisticated protocols emerging every day, traditional distributed environments and static allocation of frequency spectrum could no longer meet the needs of current wireless technology. This problem is heightened by diverse technologies and inflexible spectrum management approaches as ordinary wireless network architecture cannot self-organize without a central control. Cognitive Radio (CR) technology as solution to spectrum under-utilisation problem offered in this research implement learning and adaptation to reuse spectrum holes. A Cognitive Radio Multiple Interface (CORAMIF) model, configured with heterogeneous interfaces (IEEE 802.11, 802.16 and 802.22) are equipped via Software Defined radio (SDR) was simulated on Linux with development environment customized using C++ and Object Tool Control Language (OTCL) tools to model signal strength and propagation delay. OTCL enabled network configuration while C++ handled data traffic. NS2 implementation and binding of OTCL objects with C++ enabled the primary objective of providing highly reliable communication everywhere as needed. Using formulated spectrum-awareness configuration, intelligent adaptation at network layer enabled opportunistic channel access. Packet forwarding by Distributed Coordination Function (DCF) implemented at Medium Access Channel (MAC) layer is merged with routing at transport layer. Learning and adaptation is implemented for reconfiguration before signal fading. Based on received signal power, smooth handoff is enabled for seamless roaming. Results were obtained by comparing the performance of formulated Zone Based Routing (ZBR) algorithm with Ad-hoc Online Multipath Distance Vector (AOMDV) and Direct Sequence Distance Vector (DSDV) NS2 defaults. Measurement of performance of throughput, delay and delivery rates demonstrated remarkable prevention of interference and congestion using different algorithms. Furtherance to this, normalized power received by mobile users showed communication efficacy and traffic balance with minimal trade-offs in design. Finally, the bridged function of developed model was evaluated for congestion control and the operating parameters evaluated for seamless roaming. CR technology will therefore, augment spectrum availability and communication efficiency in future generations.
Publication Title A tabu search-based university lectures timetable scheduling model
Publication Type journal
Publisher International Journal of Computer Applications (0975–8887), 181(9):16–23
Paper Link https://doi.org/10.5120/ijca2018917599
Publication Authors Adewale O. S., Ibam E. O and Izundu K. E
Year Published 2018
Abstract Scheduling University Courses is regarded as a Nondeterministic Polynomial-time hardness (NP-hard) problem. This is because no universal constraint works for all universities. While some will have constraints similar, they might differ in their resource values - length of days, time slots, and rooms. Several literatures have been able to address several constraints, using various optimization methods - genetic algorithms, tabu search and so on. The result often time works but lacks adoptability due to their non-inclusiveness of some resource parameters – day and dynamic time-slot. In this research, we address the various constraints related to the Federal University of Technology Akure using mathematical model that includes the necessary resource parameters. We adopt tabu search diversification approach to implement a scheduling system that satisfies the constraints defined.
Publication Title Radio access evaluation of cellular network in Akure metropolis, Nigeria
Publication Type journal
Publisher Computer, Telecommunications, Software, Electrical & Electronics Engineering, 37(3):703–719.
Paper Link http://dx.doi.org/10.4314/njt.v37i3.21
Publication Authors Mebawondu J. O., Dahunsi F. M., Adewale O. S. and Alese B. K.
Year Published 2018
Abstract The higher subscription, relative importance of voice calls, client’s complaints and economy depression that now make clients to get value for money paid and need for more revenue by mobile network operator (MNOs) justified this work. The objective of this work is to measure, analyse, evaluate the performance of MNOs, and to recommend ways to improving their quality of service (QoS). Drive test approach was used for the measurements and statistical methods for the analysis. Results of the analysis shows that the quality of Voice service offered by MNOs is not optimal and there is room for improved quality service. Based on the key performance indicators, the mobile operators did not perform up to expectation. There are differences in the quality of voice service offered across mobile network operator networks based on the time of the day and the area under consideration. MNO1, MNO2, MNO3 and MNO4 gave varying quality of service. MNO4 had absolutely no dropped calls and performed best and consistently gave a retainability ratio above the target. MNO1 performance metrics were below the key performance indicator thresholds given by the Nigerian Communication Commission.
Publication Title Development of a predictive model for audio quality of service in Nigeria, International Journal of Computer Science and Information Security
Publication Type journal
Publisher International Journal of Computer Science and Information Security, 16(7):14-20.
Paper Link https://www.academia.edu/37199970
Publication Authors Mebawondu J. O., Dahunsi F. M., Adewale O. S. and Alese B. K.
Year Published 2018
Abstract The unavailability of user-based data for audio quality of service and user’s complaint about services rendered by mobile network providers are on the increase. The concern about the poor quality of service (QoS), especially for voice callers, motivated this work. The objective of this research is to develop a predictive model using decision tree algorithm and Fuzzy logic derived for the mobile telecommunication users and evaluates the performance of the model. The study proposed a predictive model for enhancing monitoring of the QoS delivery.
Publication Title Developing a secured mobile-agent-based electronic commerce using crypto-steganography
Publication Type journal
Publisher International Journal of Computer Science and Information Security, 16(7):14-20.
Paper Link https://doi.org/10.18483/ijSci.1550
Publication Authors Araoye O. I., Adewale O.S., Alese B.K. and Akinyede O. R.
Year Published 2018
Abstract Mobile agent is gaining attention in the research community because of its potential to replace traditional client-Server application in computer network system. Mobile agent has the ability to migrate autonomously from one server to another server as specified in its itinerary in computer network. Areas where mobile agent profit includes network management, information retrieval and electronic commerce. Mobile agent can be delegated to carry out all stages that are involved in electronic commerce such as Product brokering, Merchant brokering, Negotiation and Purchase. However, there are security vulnerability issues with mobile agent system such as the need to ensure confidentiality of information of the agent from malicious parties, integrity of the data of the agent and non-repudiation from parties involves in the transactions. Security measure by agent developers has been mobile cryptography. This paper combines Elliptic curve cryptography (ECC) and Steganography known as cryptosteganography to secure its agent. The agent was developed using PHP 5.0, Javascript, HTML, Wampserver and MySQL. The system was tested on a local area network with six computer systems, one of the computers represent client and the other five as servers. Performance evaluation was carried out to test for execution time and workload effect on the system. The result was compared with the existing secured agent-based electronic commerce systems in term of response time. The result shows that the proposed security is faster than RSA but a little slower than ECC only. A trade off was observed between a more secured system and response time of the system.
Publication Title A framework for ontology–based diabetes diagnosis using Bayesian optimisation technique
Publication Type journal
Publisher Journal of Natural Sciences, Engineering and Technology, 17(1&2):156-168.
Paper Link https://doi.org/10.51406/jnset.v17i1.1906
Publication Authors Okikiola F. M., Adewale O. S., Mustapha A. M., Ikotun A. M. And Lawal O. L.
Year Published 2018
Abstract Diabetes management system is a computer-based system which aid physicians in properly diagnosing diabetes mellitus disease in patients. The system is essential in making individuals who have diabetes aware of their state and type. Existing approaches employed have not been efficient in considering all the diabetes type as well as making full prescription to diabetes patients. In this paper, a framework for an improved ontology-based diabetes management system with a Bayesian optimisation technique is presented. This helped in managing the diagnosis of diabetes and the prescription of treatment and drug to patients using the ontology knowledge management. The framework was implemented using Java programming language on Netbeans IDE, Protégé 4.2 and MySQL. An extract of the ontology graph and acyclic probability graph was shown. The result showed that the nature of Bayesian network which has to do with statistical calculations based on equations, functions and sample frequencies led to more precise and reliable outcome.
Publication Title Security Threats and Privacy Issues in Vehicular Ad-Hoc Network (VANET): Survey and Perspective
Publication Type journal
Publisher Journal of Information, 4(1):1–9.
Publication Authors Ajulo E. B., Akinyede R. O. and Adewale O. S.
Year Published 2018
Abstract In Vehicular Ad Hoc Networks (VANETs) Wireless-equipped vehicles are able to communicate with each other as well as Road-Side Units (RSUs) located at strategic places on the road, this enables the formation of self-organized networks connecting the vehicles and RSUs. The (vehicles) nodes are fast mobile causing the network topology to change frequently and unpredictably. Since VANETs do not really rely on any form of central administration or control, nodes in the wireless range dynamically discover each other and establish connection with each other. Due to the pervasive nature of the mobile nodes, it cannot be assumed that VANETs will always be under the control of their owners; nodes could be stolen or tampered with. Each vehicle (node) acts as an independent router and fault detection and network management becomes distributed and more difficult. The shared wireless medium is accessible to both legitimate and illegitimate users; and this has raised formidable research challenges to providing security for this network. This paper takes a selective review of the published research work carried out in the security and privacy issue of VANET between 2003 and 2015 and derived a new perspective into the security and privacy attacks in VANET.
Publication Title A simulation model for cardless automated teller machine transactions
Publication Type journal
Publisher iManager Journal on Digital Signal Processing, 6(2):1–8.
Paper Link https://doi.org/10.26634/jdp.6.2.15588
Publication Authors Adewale O. S., Mebawondu J. O., Mebawondu O. J. and Suleiman M. N
Year Published 2018
Abstract Cardless automated teller machine (CATM) is an electronic gadget that empowers the bank’s clients to perform monetary transactions such as dispensing cash to their clients, pay bills and transfer of money. The customary approach of an ATM utilizes the use of debit card for its transactions have its limitation. The challenges in utilizing such system are extortion, security and high probability of users forgetting their passwords. In this work, we propose a straightforward paradigm called CATM. The proposed CATM model used a five-tuple finite machine. In the proposed platform a thumb print (Biometric) framework is utilized. The platform will improve services to clients, also secure, effective and efficient systems will be achieved.
Publication Title Modelling of situation response time in vehicular ad–hoc network
Publication Type journal
Publisher Jurnal Ilmu Komputer dan Teknologi Informasi, 10(1):1-7
Paper Link https://doi.org/10.18860/mat.v10i1.4785
Publication Authors Ajulo E. B., Akinyede R. O. and Adewale O. S.
Year Published 2018
Abstract Cardless automated teller machine (CATM) is an electronic gadget that empowers the bank’s clients to perform monetary transactions such as dispensing cash to their clients, pay bills and transfer of money. The customary approach of an ATM utilizes the use of debit card for its transactions have its limitation. The challenges in utilizing such system are extortion, security and high probability of users forgetting their passwords. In this work, we propose a straightforward paradigm called CATM. The proposed CATM model used a five-tuple finite machine. In the proposed platform a thumb print (Biometric) framework is utilized. The platform will improve services to clients, also secure, effective and efficient systems will be achieved.
Publication Title Affect-adaptive activities in a personalised ubiquitous learning system
Publication Type journal
Publisher International Journal of Learning, Teaching and Educational Research, 17(7):43-58.
Paper Link https://doi.org/10.26803/ijlter.17.7.3
Publication Authors Adewale O. S., Agbonifo O. C., Ibam E. O., Makinde A. I., Boyinbode O. K., Ojokoh B. A., Olabode O., Omirin M. S. and Olatunji S. O.
Year Published 2018
Abstract Cardless automated teller machine (CATM) is an electronic gadget that empowers the bank’s clients to perform monetary transactions such as dispensing cash to their clients, pay bills and transfer of money. The customary approach of an ATM utilizes the use of debit card for its transactions have its limitation. The challenges in utilizing such system are extortion, security and high probability of users forgetting their passwords. In this work, we propose a straightforward paradigm called CATM. The proposed CATM model used a five-tuple finite machine. In the proposed platform a thumb print (Biometric) framework is utilized. The platform will improve services to clients, also secure, effective and efficient systems will be achieved.
Publication Title Requirement formalisation for model checking using extended Backus Naur form
Publication Type journal
Publisher i-manager’s Journal on Software Engineering
Paper Link https://doi.org/10.26634/jse.13.3.15687
Publication Authors Aliyu E., Adewale O. S., Adetunmbi O. A., and Ojokoh B
Year Published 2019
Abstract Describing the structure of a language using rewriting rules in verifying requirements and design is still a vivid area of research. The authors describe the grammar formalism Extended Backus Naur Form (EBNF) to specify the 'if' single block construct with respect to assignment and relational operators as well as Switch, For loop, Do-while, and While loop statement to ensure program free flow. This aim to ensure correctness in the grammar rule for selective and iterative construct to parse C++ programs. The grammar describes the actions a parser must take to parse a string of tokens correctly.
Publication Title Appraisal on perceived multimedia technologies as modern pedagogical tools for strategic improvement on teaching and learning
Publication Type journal
Publisher International Journal of Modern Education and Computer Science 11(8):15-26.
Paper Link https://doi.org/10.5815/ijmecs.2019.08.02
Publication Authors Salako E. A., Adewale O. S. and Boyinbode O. K.
Year Published 2019
Abstract Secondary schools as part of the foundational level of education cannot afford to lag behind in using multimedia to improve the intellectual and creative capabilities among the teachers and students. This study investigated multimedia technologies as modern pedagogical tools for strategic improvement on the teaching and learning process. The study adopted a descriptive survey design. The population was the senior secondary school students and teachers in Kuje Area Council of Federal Capital Territory, Nigeria. A simple random sampling technique was used to select 250 students and 100 teachers. Cronbach's alpha statistical tool was used to obtain a reliability coefficient of 0.83 on validated questionnaires which were distributed to collect data from the respondents. Statistically, mean, standard deviation, percentage and partial correlation were used to answer the research questions while t-test and Chi-Square were used to test the postulated hypotheses at 0.05 level of significance. The findings showed that television sets, projectors and computers were the major multimedia facilities used for teaching and learning in the council, multimedia facilities had a high influence on teaching and learning. It was gathered that multimedia enriched teaching cognitive skills and psychomotor skills and developed concretisation of abstraction on any subject matter. Some recommendations were made which included the provision of financial support to procure multimedia facilities to schools towards the attainment of educational objectives, provision of subsiding policies by the government on the importation of multimedia facilities, employment of competent and experienced technical staff should be employed to solve a series of technical problems in using multimedia facilities. Experimental research design on the effectiveness of multimedia facilities as modern pedagogical tools for strategic improvement on teaching and learning was proposed for future work.
Publication Title Post-quantum crystography system for secure electronic voting
Publication Type journal
Publisher Open Comput. Sci., 9:292–298.
Paper Link https://doi.org/10.1515/comp-2019-0018
Publication Authors Gabriel A. J., Alese B. K., Adetunmbi O. A., Adewale O. S. and Sarumi O. A.
Year Published 2019
Abstract Security (privacy, confidentiality and integrity) of pre-electoral, electoral and post electoral phases of the electioneering process is fundamental to the success of Electronic Voting (E-Voting) Systems. Crystography, which is the combination of cryptography and steganography could be a fitting ‘tool kit’ for enhancing the security of sensitive election-related information transmitted over public networks, thereby also ensuring free, fair and credible election/voting. Most of the existing secure e-voting systems are based on public key cryptographic schemes whose security depends on the difficulty of solving integer factorisation problem and discrete logarithm problem. Consequently, the existence of quantum computers in the range of 1000 bits would spell doom to systems based on those problems. This paper presents the development of a new crystographic system that combines post quantum cryptography with steganography to ensure that the security of e-voting is maintained both in classical computing era as well as post-quantum computing era. Our experiments’ results shows that our proposed system performed better than existing ones.
Publication Title A framework for detecting credit card fraud with cost-sensitive meta-learning ensemble approach
Publication Type journal
Publisher Scientific African
Paper Link https://doi.org/10.1016/j.sciaf.2020.e00464
Publication Authors Olowookere T. A. and Adewale O. S
Year Published 2020
Abstract Electronic payment systems continue to seamlessly aid business transactions across the world, and credit cards have emerged as a means of making payments in E-payment systems. Fraud due to credit card usage has, however, remained a major global threat to financial institutions with several reports and statistics laying bare the extent of this challenge. Several machine learning techniques and approaches have been established to mitigate this prevailing menace in payment systems, effective amongst which are ensemble methods and cost-sensitive learning techniques. This paper proposes a framework that combines the potentials of meta-learning ensemble techniques and cost-sensitive learning paradigm for fraud detection. The approach of the proposed framework is to allow base-classifiers to fit traditionally while the cost-sensitive learning is incorporated in the ensemble learning process to fit the cost-sensitive meta-classifier without having to enforce cost-sensitive learning on each of the base-classifiers. The predictive accuracy of the trained cost-sensitive meta-classifier and base classifiers were evaluated using Area Under the Receiver Operating Characteristic curve (AUC). Results obtained from classifying unseen data show that the cost-sensitive ensemble classifier maintains an excellent AUC value indicating consistent performance across different fraud rates in the dataset. These results indicate that the cost-sensitive ensemble framework is efficient in producing cost-sensitive ensemble classifiers that are capable of effectively detecting fraudulent transactions in different databases of payment systems irrespective of the proportion of fraud cases as compared to the performances of ordinary ensemble classifiers.
Publication Title Development of bi-directional English to Yoruba translator for real-time mobile chatting
Publication Type journal
Publisher International Journal of Computational Linguistics (IJCL), 11(1):18-33
Publication Authors (98) Adewale O. S., Agbonifo O. C. and Olaniyan J.
Year Published 2020
Abstract Machine translation is a subfield of computational linguistics that investigates the use of computer software to translate text or speech from one natural language to another. Translating between English language and Yoruba language comes with some computational complexities such as syntactic and grammatical differences in the language pair. This paper aims at exploring a multi-layer hybridized language translation approach, which combines the Corpus-based and Rule-based approaches of machine translation to generate its outputs. A parallel corpus was built with texts from English and Yoruba languages and stored in MySQL relational database. One hundred and forty–seven computational rules were manually formulated and also stored in MySQL database for generating sentences in both languages. A di-bilingual dictionary was proposed to store words in English with their corresponding Yoruba counterparts and their equivalent parts of speech while the other dictionary stored words in Yoruba with their corresponding English counterparts and their equivalent parts of speech. A real time mobile chatting interface was developed for users’ interactions with themselves and the system. The research model was implemented using PHP for server-side scripting, JSON for data interchange and Java programming language for user interfaces accessible on users’ mobile phones. The Java programming language was coded in Android Studio 3.0 Integrated Development Environment. Two hundred and eleven sentences from Contemporary English Grammar were used for system testing and the result shows 95% accuracy compare with Google Translate.
Publication Title An Enhanced Computational Fusion Technique for Security of Authentication of Electronic Voting System
Publication Type journal
Publisher International Journal of Smart Security Technologies,7(2).
Paper Link https://doi.org/10.4018/IJSST.2020070102
Publication Authors Adewale O. S., Boyinbode O. and Salako E. A.
Year Published 2020
Abstract The detection of a false individual who had not been enrolled as a genuine participant in an election could be potentially detected in electronic voting systems as against paper-based methods. In recent time, one-time password and biometrics have been used to curtail false acceptance of imposters. However, imposters had unlawfully stolen the credentials of genuine individuals, gained unauthorised access, and polled illegitimate votes due to poor authentication methodology. The accuracy of a multi-biometric system is a function of the data type used and fusion method adopted. This paper presented a computational fusion approach that involved the use of fingerprint and randomly generated voter identification number to effectively satisfy the authentication security requirement of the electronic voting system. New architectural and mathematical equations on the proposed approach were presented to tackle the problem of false acceptance rate and improve on the true acceptance rate of a biometric system. Algorithm to achieve the proposed approach was presented in this paper as well.
Publication Title An innovative strategy for satisfying data integrity requirement of electronic voting system
Publication Type journal
Publisher Journal of Digital Innovations & Contemporary Research in Science, Engineering & Technology, 7(1):1–12
Publication Authors Adewale, O. S., Boyinbode, O. K. and Salako, E. A
Year Published 2020
Abstract corrupt politicians strategically buy votes, engage political thugs to snatch ballot boxes, pay election officers to manipulate results and pay fraudsters to intercept and alter the election results along the communication channels for selfish gains. However, a series of attempts such as passwords, secure hash functions, message authentication code, have been made to curtail the unlawful practices of results’ modification by fraudsters. The existing approaches have issues on data authentication, data repudiation and integrity. This paper presented a new technique that would satisfy the data integrity requirement of the electronic voting system using fingerprints. The paper proposed a mathematical technique that would fuse the fingerprints of polling and collation officers. It was highlighted that the technique would solve the problems of passive and active attacks on sensitive election results thereby satisfying the integrity demand of the electronic voting system. Future work would involve the implementation and evaluation of the technique presented in this paper using standard metrics.
Publication Title Hybrid intelligent model for real time assessment of voice quality of service
Publication Type journal
Publisher Scientific African 9:1–16
Paper Link https://doi.org/10.1016/j.sciaf.2020.e00491
Publication Authors Mebawondu J. O., Dahunsi F. M. and Adewale O. S.
Year Published 2020
Abstract Mobile telecommunication has made an unprecedented positive impact on every nation's economy and social life. It has allowed users to save time and money in their daily transactions and improved their quality of life. However, network inaccessibility, unreliability, and unsatisfactory voice service have led to many complaints from clients. One of the significant weaknesses inferred from the literature review is the lack of reliable user-based information for monitoring and performance evaluation. The paper proposed a hybrid model for the assessment of voice calls quality of service (QoS) offered by mobile network operators based on standard performance metrics. A performance analysis was carried out on the proposed models. The experimental study is carried out using the network data collected from volunteer's mobile phones using the host-based crowdsourced technique. The collected user-based data for QoS metrics is modelled based on the combination of the Fuzzy Logic algorithm and Takagi Sugeno Kang inference mechanism of the Neuro-Fuzzy model. The model was implemented using MATLAB and Weka analytics as front end and MySQL as backend on Windows 10 operational environment. The performance evaluation of the hybrid model shows the high accuracy of 97.10%; the true positive rate and precision rates were 95.5% and 97.47%, respectively.
Publication Title A review of electronic voting systems: strategy for a novel
Publication Type journal
Publisher International Journal of Information Engineering and Electronic Business, 2020, 1, 19-29.
Paper Link https://doi.org/10.5815/ijieeb.2020.01.03
Publication Authors Adewale O. S., Boyinbode O. K. and Salako E. A
Year Published 2020
Abstract The voting system in the world has been characterised with many fundamental challenges, thereby resulting to a corrupt contestant winning an election. Researchers have been emotionally, physically, socially and intellectually concerned about the election malpractices recorded at various levels of electing a representative. Questions on how corrupt stakeholders in elections could be prevented from fraudulent activities such as rigging and impersonation called for discussion and answers. Consequences of declaring a corrupt contestant as a winner are bad governance, insecurities and diversification of public funds for personal gains. There must be approaches to tackle the problems of voting systems. This paper focused on a comprehensive review of electronic voting systems by different scholars as a platform for identifying shortcomings or drawbacks towards the implementation of a highly secured electronic voting system. The methods used by different scholars were technically reviewed so as to identify areas that need improvement towards providing solutions to the identified problems. Furthermore, countries with history on the adoption of e-voting systems were reviewed. Based on the problems identified from various works, a novel for future work on developing a secured electronic voting system using fingerprint and visual semagram techniques was proposed.
Publication Title Visual Semagram: An Enhanced Technique for Confidentiality Requirement of Electronic Voting System
Publication Type journal
Publisher International Journal of Information Engineering and Electronic Business, 2020, 1, 19-29.
Paper Link https://doi.org/10.5815/ijcnis.2020.04.05
Publication Authors Adewale O. S., Boyinbode O. K. and Salako E. A.
Year Published 2020
Abstract One of the rights of citizens in any democratic society is to freely elect a particular candidate into a specific office for governance. This implies that among the candidates participating in an election, one of them would emerge as a winner based on the specified rules and regulation. The recent reports on the election in different parts of the world revealed that the corrupt politicians and corrupt election officers did manipulate the sensitive results thereby leading to undesired candidate emerge as a winner. This implies that election results had not been adequately secured against an attack such as alteration for false results. This paper reviewed scholarly published work and presented a novel technique using visual semagram to satisfy the confidentiality requirement of the electronic voting system. The mathematical equations on how the three primary additive colours (Red, Green and Blue) could be used to modify and conceal the election results against suspicion and alteration were presented. The significance of this paper included the presentation of a technique that would conceal any sensitive message from attackers’ suspicion and scholarly piece of information for further investigation in handling insecurity issues. The future work would involve the implementation and evaluation of the proposed technique to achieve the confidentiality requirement of the e-voting system, and to establish the validity and reliability of proposed technique.
Publication Title A Review of the Architecture of the Post-RISC Processors
Publication Type conferenceproceeding
Publisher Proceedings of the 14th National Computer Association of Nigeria Conference at Calabar, Nigeria, June 1998, 9:16–23
Publication Authors Falaki S. O. and Adewale O. S.
Year Published 1998
Abstract This paper presented an overview of the characteristics of Post-RISC processors. The paper showed that the internal implementation of Pentium Pro microprocessor is a high–performance Post-RISC processor.
Publication Title Key Issues on Wireless ATM
Publication Type conferenceproceeding
Publisher Proceedings of the 14th National Computer Association of Nigeria Conference at Calabar, Nigeria, June 1998, 9:126–137
Publication Authors Falaki S. O. and Adewale O. S.
Year Published 1998
Abstract This paper focused on wireless technologies, asynchronous transfer mode, wireless asynchronous transfer mode and key issues pertaining to wireless asynchronous transfer mode networks and also analyses the different ideas and protocols put forward by various researchers in the areas.
Publication Title Wireless Data Communication Technologies in Colleges and University Libraries
Publication Type conferenceproceeding
Publisher Proceedings of the 15th National Computer Association of Nigeria Conference at Abuja, May 1999, 10:204–211
Publication Authors Adewale O. S. and Falaki S. O.
Year Published 1999
Abstract This paper presented the basic types of wireless data communication technologies currently available and some of their application areas in the educational institutions and library settings. Some projects demonstrating the applications of wireless technologies were also discussed in the paper.
Publication Title Automation of Virtual Library Management System on an Intranet Basis.
Publication Type conferenceproceeding
Publisher Proceedings of the 16th National Computer Association of Nigeria Conference at Abuja, June 2000, 11:43–57
Publication Authors Adewale O. S., Salomoni P. and Falaki S. O
Year Published 2000
Abstract This paper presented the management of books, journals, users records, films, microfiche, audiotapes and other materials traditionally kept in libraries on an intranet basis. The idea of having a global library was also discussed.
Publication Title On the Applications on the Information Superhighway
Publication Type conferenceproceeding
Publisher Proceedings of the 16th National Computer Association of Nigeria Conference at Abuja, June 2000, 11:43–57
Publication Authors Adewale O. S. and Falaki S. O.
Year Published 2000
Abstract This paper focuses on the applications (such as e-mail, videoconferencing, video-on-demand, news-on-demand, e-commerce, internet telephony, telemedicine, distance learning, etc) that make use of the superhighway. Some of the technical issues behind these applications were also identified.
Publication Title Internet Telephony Fundamentals
Publication Type conferenceproceeding
Publisher Proceedings of the 17th National Computer Association of Nigeria Conference at Benin-City, June 2001, 12:186–214
Publication Authors Adewale O. S. and Falaki S. O.
Year Published 2001
Abstract This paper discussed the ongoing and rapid evolution of internet telephony, the forces fuelling that evolution, and the benefits realised from it, as well as the underlying technologies. It further examined some of the challenges facing internet telephony and suggested solutions.
Publication Title Electronic Commerce – Promises, Threats, Trust and Payment Systems
Publication Type conferenceproceeding
Publisher Proceedings of the 17th National Computer Association of Nigeria Conference at Benin-City, June 2001, 12:84–103
Publication Authors Adewale O. S. and Falaki S. O.
Year Published 2001
Abstract This paper discussed some of the payment systems under development to facilitate the establishment of a secure, convenient and cost-effective payment system on the internet. The paper also provided different ways in which e-commerce can be structured so as to achieve sufficient trust between the buyer and the seller.
Publication Title Customisation of GIS for Urban Development Monitoring
Publication Type conferenceproceeding
Publisher Proceedings of the 18th National Computer Association of Nigeria Conference at Abuja, June 2002, 13:260–273
Publication Authors Adewale O. S.
Year Published 2002
Abstract This paper discussed the application of geographic information system (GIS) for planning and management in the local authority/ministry of land and housing. That is, how to use geographic information system as a decision support tool for urban development.
Publication Title Firewall Technology: Packet Filtering, Application Proxies and Stateful Inspection Systems
Publication Type conferenceproceeding
Publisher Proceedings of the 18th National Computer Association of Nigeria Conference at Abuja, June 2002, 13:91–109
Publication Authors Adewale O S and Falaki S O
Year Published 2002
Abstract This paper focused on firewall architectures and firewall systems such as the application and functionality of packet-filtering system, application-level firewall system, and the newer technology of stateful inspection firewall system. The paper also provided an evaluation of these competing technologies.
Publication Title Development of internet-based collaborative and distance education system
Publication Type conferenceproceeding
Publisher In Proceedings of 20th Annual Conference of the Nigeria Computer Society, pp. 251–262
Publication Authors Agbonifo. O. C and Adewale O. S.
Year Published 2006
Abstract The paper presented an internet-based education system that allows increased access to high quality university education based on the principle of active learning, collaboration and knowledge building. A multi–layered hierarchical course structure model for capturing lecturers’ data structure and organisation of the study materials were developed and implemented.
Publication Title Reliability issues of GSM security protocol
Publication Type conferenceproceeding
Publisher College of Science and Technology, Covenant University, Ota, Nigeria, pp. 124–130
Publication Authors Ogundele O. S., Adewale O. S. and Alese B. K.
Year Published 2007
Abstract Global System for Mobile Communication (GSM) began in 1982. The development of GSM marks the official beginning of second-generation cell phone technology. It provides several security mechanisms. These include anonymity, authentication, and confidentiality. The study therefore discussed the reliabilities issues of GSM security protocol which include weak crypto, SIM issues, the fake base station attack, and a total lack of replay protection and its effects on the future architecture of GSM technology
Publication Title Information revolution through Information and Communication Technology
Publication Type conferenceproceeding
Publisher Second Region 8 IEEE Conference on the History of Communications, Madrid, pp. 1–6.
Publication Authors Agbonifo O. C. and Adewale O. S.
Year Published 2010
Abstract The global perspective about the term “information†is indeed a reflection of the strength of any nation, in order words, “information is powerâ€. Information is the key that transforms to knowledge. The amount of information received, stored, processed, retrieved and disseminated can bring about positive changes in the development of any nation. The deployment of information technology (IT) has revolutionised the information power of knowledge-based society. This has significant impact on all things that concerns God's given endowment on man and life generally. Hence, this paper presents the state of art of “information†before and after the advent of IT vis-à -vis its mode of accessing and disseminating.
Publication Title Securing mobile payment system using personal identification number (PIN) method
Publication Type conferenceproceeding
Publisher In Proceedings of the International Conference and Workshop on Software Engineering and Intelligent Systems (eds Daramola O., Ikhu–Omoregbe N., Ayo C., Omogbadegun O., Azeta A. and Oladipupo F), Covenant University, Ota, Nigeria, pp. 23 – 33
Publication Authors Akinyede R. O., Adewale O S and Alese B. K.
Year Published 2010
Abstract Mobile payment is the process whereby two parties exchanging financial value using a mobile device in return for goods or services. In Nigeria, banking industry and citizens all incur a high overhead in using physical cash. However, mobile phone-based payment system is a viable alternative to physical cash since it incurs much lower overheads and offers more convenience as the users can transact business anytime of the day, 24/7. Because security is of paramount importance in any financial transactions, this paper, therefore, focuses its attention on the security issues in mobile payment for m-commerce with emphasis on personal identification number (PIN). The paper presented a review of m-commerce, m-payment and its operational model, the technologies and standards for m-payment systems. Finally, the paper proposed a method and system for securing a payment transaction model.
Publication Title A computer-based security framework for crime prevention in Nigeria
Publication Type conferenceproceeding
Publisher In Proceedings of Information Technology for People-Centred Development, Nigeria Computer Society, pp.
Publication Authors Ogunleye G. O., Adewale O. S., Alese B. K. and Ogunde A. O.
Year Published 2011
Abstract In recent times, crime rate in Nigeria has risen to the level in which there is a public outcry to the government for urgent solution. Government has adopted various security policies to secure the lives and properties of its citizens, but none of these policies has actually yielded a positive result. Human abduction, armed robbery, terrorism, bomb attacks and lot more have been the order of the day in the country. In the light of this, the government has come up with the introduction of computer-based closed–circuit television (CCTV) cameras in public places to monitor and record images of what is taking place in specific locations. Many developed countries have used CCTV to reduce the crime rate in their respective countries. Because CCTV is relatively new in Nigeria, it is still not clear how effective it is in deterring or reducing crime. Consequently, community perceptions were sought to know the effectiveness and acceptability of the tool in public places. However, being one of the ingredients of information technology for national security, respondents actually gave good indicators in supporting the usage of CCTV provided it is implemented with proper mechanism and run by the right organisation. The article recommended few important factors as pillars to secure the framework such as operational requirements, decision guidelines, performance standard, evidence requirements and importance of CCTV operators.
Publication Title Temperature based embedded programming algorithm for conventional machines condition monitoring
Publication Type conferenceproceeding
Publisher In Proceedings of the Third International Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking, pp. 51–57.
Publication Authors Adeyeri M. K., Kareem B., Aderoba A. A. And Adewale S. O.
Year Published 2012
Abstract A temperature-based embedded programming algorithm for conventional machines condition monitoring is being discussed. Machinery health deteriorates day in day out as they are being used for production purposes. If a proper check, maintenance activities and monitoring are not put in place, such machinery would not perform optimally and production efficiency would be affected. Based on this, this article focuses on programming a temperature sensor AD595 and K-type thermocouple using a C programming language as a means of embedding them into the microcontroller with a real time clock incorporated to keep the time of events and temperature readings of the machines’ components for effective maintenance plan. The whole design is embedded in production machines to keep monitoring the machines’ conditions and behaviour as related to temperature induced faults and breakdown matters. The algorithm interprets and reports the fault class name to the operator, diagnosis and proffer solutions based on the embedded decision block. The hardware resulting from the design was tested using a conventional elevator, silos and hammer mill (which are parts of the production set up line for the production of vegetable oil) for a period of four months. The output performance is satisfactory as maintenance decision and machines’ health monitoring are optimised.
Publication Title Factors influencing the adoption of e-government services in Nigeria
Publication Type conferenceproceeding
Publisher In Conference Proceedings of Nigeria Computer Society on eGovernment & National Security, pp. 90–96
Publication Authors Ogunleye G. O., Adewale O. S. and Alese B. K.
Year Published 2012
Abstract The rise of e-government has been one of the most striking developments on the web with the increased deployment of information technology by governments through the advent of the World Wide Web. E-government is an initiative aimed at reinventing how the Government works and to improve the quality of interactions with citizens and businesses through improved connectivity, better access, furnishes high quality services and better processes and systems. Nevertheless, e-government enterprise is still in their growing stage in the developing countries and is being confronted with numerous problems which limits its widespread use. This paper therefore focuses on the exploration of the challenges and barriers of e-government services from the user’s perspective. An improved version of the unified theory of acceptance and use of technology model is used to investigate the factors influencing the acceptance of e-government services in Nigeria. The results show that the factors influencing the adoption of e-government services in Nigeria are associated with ease of use, usefulness, social influence, technological issues, lack of awareness, data privacy, and trust.
Publication Title A fuzzified deception detection system
Publication Type conferenceproceeding
Publisher In Conference Proceedings of Nigeria Computer Society on eGovernment & National Security, pp. 35–37.
Publication Authors Iyare O., Alese B. K., Adewale O. S. and Falaki O. S.
Year Published 2013
Abstract The development of a fuzzy approach in law enforcement agencies has a wide range of application to intelligence analysis during interrogation and evidence gathering in the face of investigation. The ability of these methods to mitigate attempted deception by an informant or suspect is affected by many factors including the choice of analytical method, the type of hybridization used, and the ability to address issues of source reliability and information credibility. This paper presents a hybrid system of verbal and non-verbal deception indicators using fuzzy system to aid in the detection of deception during interrogation.
Publication Title Post-Quantum Crystography: A combination of Post-Quantum Cryptography and Steganography
Publication Type conferenceproceeding
Publisher In 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) pp. 449–452.
Paper Link https://doi.org/10.1109/ICITST.2013.6750240
Publication Authors Gabriel A. J., Alese B. K. Adetunmbi A. O. and Adewale O. S.
Year Published 2013
Abstract There are lots of programming problems on the web, which are gathered together by online judge systems. The solution reports of the programming problems are scattered on different web sites. These programming problems and the corresponding solution reports are not organized effectively for tutoring programming. Students and teachers may hope that a...
Publication Title Building a Secure Environment for Client-Side Ecommerce Payment System Using Encryption System
Publication Type conferenceproceeding
Publisher In 8th International Conference for Internet Technology and SecurIn Proceedings of the World Congress on Engineering 2014, I, July 2 - 4, London, U.Ked Transactions (ICITST-2013) pp. 449–452.
Publication Authors Akinyede R. O., Alese B. K., Adewale O. S.
Year Published 2014
Abstract Client-side computer, network connection between client and merchant web site’s server, web site’s server and software that allow it to run properly have become the target of attackers. Literature has shown that client-side network of the system has become the target of the attackers, this is because it involves buying, and selling and fund transfer by customers, merchants and financial institutions. Unfortunately, many of the researches that have been done in this area have not provided the required solutions. Hence, this paper presents a client-side network security to safeguard information stored on the system from individuals that attempt to gain unauthorised access to data. Architecture of the system is designed by using advanced encryption system–AES encryption/decryption algorithm. The symmetric key cryptosystem can protect transaction data such as account numbers, amount and other payment information from alterations. The system uses the most common method of authentication which is user name and password
Publication Title A Survey on Mobile Cloud Computing with Embedded Security Considerations
Publication Type conferenceproceeding
Publisher In Proceedings of IEEE International Conference on Cloud Computing Technology and Science,
Publication Authors Waziri V. O., Abah J., Adewale O. S., and Abdullahi M. B.
Year Published 2014
Abstract as a service via the Internet. Mobile cloud computing integrates cloud computing with mobile devices. By this architecture, certain challenges (e.g., battery life, storage, and bandwidth) of mobile devices are addressed. Cloud computing provides the foundation for mobile cloud computing through the delivery of services, software, storage and computational capacity over the Internet, thereby reducing cost, increasing storage, improving battery life of mobile devices and providing flexibility and mobility of data and information. However, the realisation of some of these benefits is far from reality in mobile applications, as a result, opens new areas of research such as security of privacy and services. To better understand how to facilitate the development of mobile cloud computing, this paper presents a survey of the existing work in mobile cloud computing in the context and principles of its foundational cloud computing technology to better understand mobile cloud computing in the development of better and stronger mobile applications.
Publication Title An enhanced graphical password technique using fake pointers
Publication Type conferenceproceeding
Publisher In Proceedings of Informing Science & IT Education Conference pp. 79–89
Paper Link https://doi.org/10.28945/2221
Publication Authors Alese B. K., Omojowo A. A., Adesuyi A. T., Thompson A. F., Adewale O. S., and Osuolale F. O.
Year Published 2015
Abstract Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the determination of a user being allowed access to a resource(s) is done cautiously. Alphanumeric password has been used for authentication, however, it is inherently limited. Graphical password is a possible alternative. However, graphical password technique is also vulnerable to attacks. In this paper, a user authentication technique called “FAKEPOINTER†is proposed to conceal users’ authentication secret regardless of a shoulder surfer success by video camera(s). In the software designed, a graphical password fake indicator (pointer) is incorporated to enhance users’ login (password) against attack. The system is designed to run on windows platform with .Net support with Microsoft Structured Query Language Server as the back end, C# as front end. The system performs better when compared to existing system.
Publication Title Development of a prioritised scheduling algorithm for congestion management in long term evolution
Publication Type conferenceproceeding
Publisher In Proceedings of the World Congress on Engineering and Computer Science 1, October 19-21, 2016, San Francisco, USA.
Publication Authors Kuboye B. M, Adewale O. S., Alowolodu O. D. and Damilola E. O.
Year Published 2016
Abstract The surfacing of a Long–Term Evolution (LTE) in a mobile network environment was welcomed by the public due to its promising high speed and capacity in both voice and internet services. The number of subscribers to this network continues to increase daily thereby giving rise to congestion on the scarce resources available for allocation to the subscribers. Scheduling is one of the methods that that can be employed to mitigate the congestion on the network; as a result, several scheduling algorithms on the management of Radio Blocks (RBs) in LTE Networks were studied. Thereafter, a new prioritised algorithm was designed and simulated using Simulink in MATLAB. The results were compared to Best CQI and Round Robin. The proposed algorithm showed promising statistics in comparison with the Best CQI and Round Robin algorithms in terms of throughput and resource block allocation fairness.
Publication Title Application of machine learning to the diagnosis of lower respiratory tract infections in paediatric patients
Publication Type conferenceproceeding
Publisher In Proceedings of the second International Conference on Information and Communication Technology and Its Applications, Federal University of Technology, Minna, Nigeria, pp. 510–515
Publication Authors Olayemi O. C., Adewale O. S., Olasheinde O. O., Ojokoh B. A. and Adetunmbi A. O.
Year Published 2018
Abstract Lower Respiratory Tract Infection (LRTI) is a common infection among children in both tropical and subtropical regions which includes Africa, America and Asia. World Health Organization reported more than 2.5 million of deaths as a result of LRTI in 2012, late and untimely diagnosis of this infection is one of the factors responsible for its high mortality rate. This paper employed the use of machine learning techniques to diagnose the presence of LRTI in infants. The LRTI dataset obtained from Federal Medical centre Owo in Ondo State was pre-processed and relevant attributes obtained from it as well as the whole pre-processed dataset were used to implement a Naïve Bayes and K-nearest neighbour machine learning models using java programming language. The performance of the models was evaluated based on accuracy, sensitivity, specificity and precision. The result of Naïve Bayes and k-nearest neighbour with all features (18) used shows 94.25% and 94.43% respectively. Naïve Bayes with information- based feature selection method shows accuracy of 99.60% while k-nearest neighbour shows 94.35% with 10 features. Also, Naïve Bayes with Correlation-based feature selection method shows accuracy of 95.40% while k-nearest neighbour shows 95.40% too with just six (6) features. The comparative results show that Naïve Bayes with information–based feature selection method performs stronger and better than others.
Publication Title University Digital Libraries: adaptive, personalised e-learning system
Publication Type others
Publisher Yerimah Prints, ISBN: 978-38410-2-5
Publication Authors Adewale O. S.
Year Published 2007
Abstract This book provides an introduction to the fundamentals of university digital libraries, adaptive personalised e–learning system in undergraduate core courses. The proposed model is a pedagogically sound approach to adaptively composed e-learning system. The developed e–learning system has the potential of positively influencing teaching and learning practices in our educational institutions.
Publication Title Introduction to Object Oriented FORTRAN
Publication Type others
Publisher Adeyemo Publishing House, ISBN: 978-978-48278-2-9
Publication Authors Adewale O. S.
Year Published 2007
Abstract This book is concerned with Fortran 90 programming, with concise description of the whole language. Fortran has always been the principal language in the fields of scientific numerical and engineering programming. The fundamental building blocks of object-oriented programming are introduced in the book. The book is very useful at all levels of education.
Publication Title University Digital Libraries: an initiative to improve research, teaching and service
Publication Type others
Publisher Adeyemo Publishing House, ISBN: 978-068-719-8
Publication Authors Adewale O. S.
Year Published 2006
Abstract This book provided an in-depth coverage of tools and techniques for building digital libraries. The author has produced a three-tier architecture which is capable of achieving his set goals. The development of the university digital library system is based on open source solution.
Publication Title Converge in divergence in information technology: a symbiosis
Publication Type others
Publisher The Federal University of Technology, Akure, Nigeria, Inaugural Lecture Series 72, Delivered on Tuesday October 20, 2015
Publication Authors Adewale O. S.
Year Published 2015
Abstract The inaugural lecture demonstrated that convergence has, and will continue to have, profound impact on technology, industry, and that the larger society as the traditional fields of communications and computing have already been irreparably changed by the other. While computing the absence of communications has led to new applications and made substantive changes to leisure and work life, computing in conjunction with communications has a greater impact on society. This is because communication is the heart of what makes society and a civilisation, and the convergence with computing revolutionises the nature of that communications. The lecture further presented some of the opportunities brought by technological convergence. These are traffic modelling, internet–based telemedicine system, data/internet telephony integration, digital libraries, personalised e–learning system, and web–based system for university undergraduate admission selection and placement. The lecture further demonstrated that proper management of technological convergence plays an important role in national economic and social development where government can capitalise on the opportunity to simulate market development and meet previous unmet society communication needs. The lecture finally recommended among others that there should a mandatory seamless interconnectivity among telecommunications operators in the country; adoption and deployment of all the presented proposed systems and also investment in the development and provision of bomb detector wearable devices that could be used and disable bombs for combating and controlling spate of suicide bombings in Nigeria.