Adewale Sunday - Academia.edu (original) (raw)
Papers by Adewale Sunday
Leaning management system focus on supporting teachers in creating and holding online courses but... more Leaning management system focus on supporting teachers in creating and holding online courses but did not consider individual differences in learners such as leaning styles. The impact of learning styles on learning has recently been the focus of scholars and how it can be supported by learning systems. Adaptive educational systems provide learners with courses that fit their individual needs and characteristics such as their learning styles. This research established 24 learning styles from the 8 learning styles of Felder Silverman model. Learners subjected to the system were tested using Felder Silverman learning style model and the proposed model. Scores were recorded and comparison were made for evaluation.
Emerging wireless technologies incorporate different access networks. Bluetooth, Wireless Fidelit... more Emerging wireless technologies incorporate different access networks. Bluetooth, Wireless Fidelity (Wi-Fi), Universal Mobile Telecommunication System (UMTS) and Worldwide Interoperability for Multiple Access (WiMAX) technologies form heterogeneous network characterized with high resource demand and rapidly changing traffic patterns. Limited co-existence of all mobile users is attributed to poor adaptation of infrastructure and increasing demand of applications/services. More problem of deteriorating service is offered in switching between different access technologies and/or between multiple operators. Subsequently, mobile users experience service disruptions, which make carriage of two or more devices expedient for continuous service to be enjoyed while leaving ‘home’ network area. Though, some projects have implemented multiple Wi-Fi interfaces, the mobile node only provides for single Wi-Fi or dual WLAN interfaces, which does not allow researchers simulate flexible scenario as us...
Journal of Computer Science and Technology, 2011
There are considerable number of approaches to policy specification both for security management ... more There are considerable number of approaches to policy specification both for security management and policy driven network management purposes as reported in [20]. This specification sort security policies into two basic types: authorization and obligation policies. Most of the researches in security policies specification over the years focus on authorization policy modelling. In this paper, we report our approach in the design and Modelling of obligation Policy as delegation in information security by considering separation of duty and trust as pre-requisite conditions for delegation. The formal structures of the Delegation models developed was adapted from the Mathematical structures of Separation of duty (both Static and Dynamic SoD) in RBAC environment as described in [8] and [16]. Three factors of Properties, Experiences and Recommendation as described in [22] were used for the Trust Modelling. Future works proposed include the development of a formal model for revocation afte...
The Turkish Online Journal of Distance Education, 2012
The population of students all over the world is growing without a proportionate increase in teac... more The population of students all over the world is growing without a proportionate increase in teaching/learning resources/infrastructure. There is also much quest for learning in an environment that provides equal opportunities to all learners. The need to provide an equal opportunity learning environment that will hitherto improve the system of education globally has therefore become imperative. Based on our findings, a mathematical model Web-based Virtual Classroom system (WebVCS) was developed to provide a viable medium through which sound education can be offered in tertiary institutions that can carter for varieties of learners irrespective of their abilities, dispositions and geographical locations. Our system model is developed based on active learning approach that adopts blended learning theory (Constructivist-Cognivist learning approach), incorporating e-pedagogy that supports collaboration among participants in the web-based Virtual learning environment. The key objects us...
Hidden Markov Models (HMMs) have been shown to achieve good performance when applied to informati... more Hidden Markov Models (HMMs) have been shown to achieve good performance when applied to information extraction tasks. This paper describes the training aspect of exploring HMMs for the task of metadata extraction from tagged bibliographic references. The main contribution of this work is the improvement of the technique proposed by earlier researchers for smoothing emission probabilities in order to avoid the occurrence of zero values. The results show the effectiveness of the proposed method.
Network and Complex Systems, 2013
This paper is an attempt to substantiate the fact that socio economic issue has to be put into co... more This paper is an attempt to substantiate the fact that socio economic issue has to be put into consideration in any effort at preventing software piracy. A legitimate software owner must be given certain period of grace to cater for unforeseen contingencies during which re-installation is allowed without being counted against him. A mathematical equation - TUSRUC EQUATION (Time Usage of Software in Respect of Unforeseen Contingencies) is developed as an algorithmic function, which shows the way the system handles cases of unforeseen contingencies during the “first time” period of using a software product. These unforeseen contingencies can include the following and not limited to; reformatting of a system, sudden virus attack, system hardware damage. Keywords: Software Piracy, Unforeseen contingencies, TUSRUC
The major challenge of the traditional learning system is space-time restriction and it is teache... more The major challenge of the traditional learning system is space-time restriction and it is teacher-centred. The emergence of Information Technology gave rise for e-learning systems which are characterized with the components of teacher-centred and one-size-fits-all strategy. Subsequently, the concept of personalisation with learning technology was introduced that provides adaptation of learning contents to learning requirements of the learners. Hence, this research paper develops a personalised e-learning system that matches teaching strategy with learners" learning style using Myers-Briggs Type Indicator (MBTI). The emphasis is laid on adaptive teaching strategy and revising the teaching strategy for the purpose of increasing learners" learning performance. The mathematical model is developed for profiling learners to determine their learning style based on the MBTI questionnaire and Dynamic Bayesian Network is applied to revise the teaching strategy. The system is implemented using PHP and Wamp server and the database is designed using Structured Query Language (SQL). The developed system is tested using Undergraduate students studying Information Technology at
Journal of Engineering and Technology, 2017
Wireless Sensor Networks are crucial substructure made up of microcontroller, sensing units and c... more Wireless Sensor Networks are crucial substructure made up of microcontroller, sensing units and communication interfaces designed to enable the users possess the capability to measure, collect and responds to phenomenon within the surrounding been monitored. WSN are viewed as an edge between the physical and the virtual world. More so, the demand of fluid transportation from the production point to the region of end users has led to an increase in the number of pipelines that are fabricated globally. Pipeline infrastructure is generally regarded by many countries as a key element for national development, therefore shielding and observing the pipeline is essential for a successful economy. The current techniques in pipeline monitoring and surveillance include visual inspection, the use of Unmanned Aircraft, Ground Penetrating Radar, Fibre Cabling Technology, and Wireless Sensor Networks. This paper presents the various techniques, strengths and weaknesses when deployed for continuou...
FUOYE Journal of Engineering and Technology, 2021
In recent time, there is an increasing growth in the amount of trading taking place in the curren... more In recent time, there is an increasing growth in the amount of trading taking place in the currency exchange market. However, effective analysis and simulation tools for performing accurate prediction of these exchange rates are lacking. To alleviate this challenge, this work presents an hybrid machine learning and prediction model by suitably combining the Sample Mean Estimator (SME) simulation architecture with the multiple linear regression technique based training of feed-forward parameters. The developed model has the capability to overcome prediction inaccuracy, inconsistent forecasting, slow response due to computational complexity and scalability problems. The SME method is used to overcome the problems of uncertainty and non-linearity nature of the predictive variable as it’s always affected by economic and political factors. The implementation of the proposed currency exchange rate forecasting system is achieved through the use of a developed in-house Java program with Ne...
Nigerian Journal of Technology, 2018
International Journal of Learning, Teaching and Educational Research, 2018
Many literatures have shown the importance of emotion in learning because of their effect on lear... more Many literatures have shown the importance of emotion in learning because of their effect on learner"s performances thereby giving reasons why learners" affective states are crucial to learning. In this light, this research work aims to identify affect-adaptive activities that would improve learning in a personalised ubiquitous learning system by detecting learning style and affective states through some patterns of behaviours. In the study, learners" preference are determined, learners affective states such as confidence, effort, independence and confusion are investigated. The ant colony clustering algorithm is used to determine learners" activities. The four affective states are determined from the learners" forum threads, content activities, assessment, timing, and discussion through learners" engagement. The result of this research on two separate courses, Course A (Affect) and Course B (Non-Affect) shows that the four affective states influence learning. The average mean and standard deviation (SD) value for Course A (Mean=276.23, SD=272.27) over Course B (Mean=200.58, SD=210.51) showed an improvement in learning performance and the t-Test carried out between the courses suggested that students" performance is dependent on their affective states.
Open Computer Science, 2019
Security (privacy, confidentiality and integrity) of pre-electoral, electoral and post electoral ... more Security (privacy, confidentiality and integrity) of pre-electoral, electoral and post electoral phases of the electioneering process is fundamental to the success of Electronic Voting (E-Voting) Systems. Crystography, which is the combination of cryptography and steganography could be a fitting ‘tool kit’ for enhancing the security of sensitive election-related information transmitted over public networks, thereby also ensuring free, fair and credible election/voting. Most of the existing secure e-voting systems are based on public key cryptographic schemes like RSA and Elliptic Curve Cryptography (ECC), whose security depends on the difficulty of solving Integer Factorization Problem (IFP) and Discrete Logarithm problem (DLP) respectively. However, techniques for solving IFP and DLP problems, improves continually. One of such is the quantum algorithm discovered by Peter Shor in 1994, which can solve both IFP and DLP problems in polynomial time. Consequently, the existence of quant...
Oriental journal of computer science and technology, 2016
Social networking website creates new ways for engaging people belonging to different communities... more Social networking website creates new ways for engaging people belonging to different communities, moral and social values to communicate and share valuable knowledge, therefore creating a large amount of data. The importance of mining social media cannot be over emphasized, due to significant information that are revealed which can be applied in different areas. In this paper, a systematic approach for traversing the content of weblog, considering location and time (spatiotemporal) is proposed. The proposed model is capable of searching for subjects in social media using Boyer Moore Horspool (BMH) algorithm with respect to location and time. BMH is an efficient string searching algorithm, where the search is done in such a way that every character in the text needs not to be checked and some characters can be skipped without missing the subject occurrence. Semantic analysis was carried out on the subject by computing the mean occurrence of the subject with the corresponding predica...
Journal of Internet Technology and Secured Transaction, 2014
Biometric Technology is fast taking over from the conventional use of ID Cards, PINs, Tokens and ... more Biometric Technology is fast taking over from the conventional use of ID Cards, PINs, Tokens and Passwords. This is becoming essential because of the issues of forgotten passwords, stolen ID Cards, compromised tokens and spoofed PINs. Palm-print authentication for access control has been deployed in so many areas of security concern in developing countries. Even though it is still in the theoretical stage in Nigeria, this paper seeks to evaluate the stages involved in the processing of palm-print images for identification or human authentication. It focuses on the feature extraction stage which is where the required features are separated from the others. T
Acta Informatica Pragensia, 2016
Wireless Sensor Networks (WSNs) are densely and largely deployed in a variety of environments to ... more Wireless Sensor Networks (WSNs) are densely and largely deployed in a variety of environments to sense real-world events. Many approaches have been proposed for collecting sensory data in any wireless sensor networks in a flexible, reliable, and efficient manner. In this study, we design an efficient mobile agent-based model for data gathering in wireless sensor networks to achieve energy and timely collection of sensory information in the target scene. The current focus in wireless sensor networks is placed on energy optimization during data gathering, processing and transmission. Mobile Agents (MAs) as a piece of a program have attracted growing research interest that travels the network from node to node to compute the local data to get useful information globally. Mobile agent’s features such as autonomy, social ability, learning, and more significantly, mobility makes it a chosen technology for information processing in wireless sensor networks and other resource constrained co...
International Journal of Information Technology and Computer Science, 2016
Insecurity is one of the major challenges that the entire world is facing now, each country havin... more Insecurity is one of the major challenges that the entire world is facing now, each country having their peculiar security issues. The crime rate in every part of the society these days has become a threatening issue such that vehicles are now used for co mmitting criminal activities mo re than before. The issue of vehicle theft has increased tremendously, mostly at gunpoint or car parks. In view of these, there is a need for adequate records of stolen, identified and recovered vehicles which are not readily available in our society and as such very important. The development of a vehicle theft alert and location identification system beco mes more necessary for vehicle o wners to ensure theft prevention and a speedy identification towards recovery efforts in situations where a vehicle is missing, stolen or driven by an unauthorized person. The theft alert function makes use of a GSM applicat ion developed and installed in a mobile phone device wh ich is embedded in the vehicle to communicate with the vehicle owner's mobile phone. The communicat ion is established via SMS (i.e. between the installed mobile phone device and that of the vehicle owner). The co mmunications established include; (i). Sending an SMS alert fro m installed mobile phone device to vehicle owner mobile phone when the car ignition is put on. (ii). Sending an SMS fro m the vehicle owner's mobile phone to start and stop the installed mobile phone device application. The location identificat ion function makes use of a web application developed to; (i). Determine the real time location of a vehicle by means of tracking using GPS. (ii). Broadcast missing or stolen vehicle informat ion to social media and security agency. The implementation of the installed mobile phone device application was done using JAVA because of its capabilit ies in programming mobile applications while PHP and MySQL was used for the web application functions. Integration testing of the system was carried out using simple percentage calculation for the performance evaluation. Fifty seven (57) vehicle owners were sampled and questionnaires were d istributed to them in order to ascertain the acceptability and wo rkab ility of the developed system. The result obtained shows the effectiveness of the system and hence it can be used to effectively monitor vehicle as it is been driven within or outside its jurisdiction. More so, the system can be used as database of missing, identified or recovered vehicles by various security agencies.
International Journal of Cloud Computing and Services Science, Apr 13, 2014
The emergence of cloud computing hold a promise to computing where software is provided as a serv... more The emergence of cloud computing hold a promise to computing where software is provided as a services (SaaS) via the Internet. Mobile cloud computing integrates cloud computing with mobile devices. By this architecture, certain challenges (e.g., battery life, storage, and bandwidth) of mobile devices are addressed. Cloud computing provides the foundation for mobile cloud computing through the delivery of services, software, storage and computational capacity over the Internet, thereby reducing cost, increasing storage, improving battery life of mobile devices and providing flexibility and mobility of data and information. However, the realization of some of these benefits is far from reality in mobile applications, as a result, opens new areas of research such as security of privacy and services. To better understand how to facilitate the development of mobile cloud computing, we surveyed existing work in mobile cloud computing in the context and principles of its foundational cloud computing technology. We provided a definition of mobile cloud computing and gave a summary of results from this review, in particular, the models, architecture, applications and challenges of mobile cloud computing. We concluded with recommendations for how this better understanding of mobile cloud computing can assist in the development of better and stronger mobile applications.
IFIP International Federation for Information Processing
Security of networking systems has been an issue since computer networl<s became prevalent, most ... more Security of networking systems has been an issue since computer networl<s became prevalent, most especially now that Internet is changing the facie computing, hitrusions pose significant threats to the integrity, confidentiality and availability of information for the internet users. In this paper, a new approach to real-time network anomaly intrusion detection via Fuzzy-Bayesian is proposed to detect malicious activity against computer network; the framework is described to demonstrate the effectiveness of the technique. The combination of fuzzy with Bayesian classifier will improve the overall performance of Bayes based intrusion detection system (IDS). Also, the feasibility of our method is demonstrated by the experiment performed on KDD 1999 IDS data set.
International Journal of Computer Applications, 2015
It is a common knowledge in this current age that the challenge is no more the availability of in... more It is a common knowledge in this current age that the challenge is no more the availability of information but accessing the appropriate information. This challenge is attributed to the fact that information is highly unstructured. An innovative technology called XML Topic Map (XTM) is used to address the challenge. However, the technology is equally associated with an issue known as dead links as a result of lack of maintenance which causes a lot of time wastage thereby making the technology not very effective. Therefore, this paper presents an XTM-based system using News domain as case study to solve the issue of dead links. The system is a three-tier architecture implemented with Java Server Pages (JSP). The study offers a time saving system that would assist user to identify URLs that are dead in XTMbased applications as soon as user access topic.
International Journal of Computer Applications, 2014
The use of integrating technology with learning has been a pivot that transformed the role of ins... more The use of integrating technology with learning has been a pivot that transformed the role of instructors and students; and makes it both technology-driven and learner-centric controlmediated. It has been a research-based issue in connecting technology and learning theories for effective learning performance. Learning should be a platform where students are actively engaged in a process to construct a realistic and meaningful knowledge suitable to solve an impressing and confronting societal problems for sustainable development. The approach to learning has been in diverse ways from the fundamental principles of learning theories and strategies. The emphasis of learning is in making it a platform where students can be attracted to it to study effectively, for easy retention and recall and able to apply the knowledge acquisition to futuristic similar real-world problems. Many researchers have worked along with this school of thought; all is to enhance study performance of students. Hence, the research paper develops a framework of e-learning system that engages students in active cognitive tasks to enhance their learning performance.
Leaning management system focus on supporting teachers in creating and holding online courses but... more Leaning management system focus on supporting teachers in creating and holding online courses but did not consider individual differences in learners such as leaning styles. The impact of learning styles on learning has recently been the focus of scholars and how it can be supported by learning systems. Adaptive educational systems provide learners with courses that fit their individual needs and characteristics such as their learning styles. This research established 24 learning styles from the 8 learning styles of Felder Silverman model. Learners subjected to the system were tested using Felder Silverman learning style model and the proposed model. Scores were recorded and comparison were made for evaluation.
Emerging wireless technologies incorporate different access networks. Bluetooth, Wireless Fidelit... more Emerging wireless technologies incorporate different access networks. Bluetooth, Wireless Fidelity (Wi-Fi), Universal Mobile Telecommunication System (UMTS) and Worldwide Interoperability for Multiple Access (WiMAX) technologies form heterogeneous network characterized with high resource demand and rapidly changing traffic patterns. Limited co-existence of all mobile users is attributed to poor adaptation of infrastructure and increasing demand of applications/services. More problem of deteriorating service is offered in switching between different access technologies and/or between multiple operators. Subsequently, mobile users experience service disruptions, which make carriage of two or more devices expedient for continuous service to be enjoyed while leaving ‘home’ network area. Though, some projects have implemented multiple Wi-Fi interfaces, the mobile node only provides for single Wi-Fi or dual WLAN interfaces, which does not allow researchers simulate flexible scenario as us...
Journal of Computer Science and Technology, 2011
There are considerable number of approaches to policy specification both for security management ... more There are considerable number of approaches to policy specification both for security management and policy driven network management purposes as reported in [20]. This specification sort security policies into two basic types: authorization and obligation policies. Most of the researches in security policies specification over the years focus on authorization policy modelling. In this paper, we report our approach in the design and Modelling of obligation Policy as delegation in information security by considering separation of duty and trust as pre-requisite conditions for delegation. The formal structures of the Delegation models developed was adapted from the Mathematical structures of Separation of duty (both Static and Dynamic SoD) in RBAC environment as described in [8] and [16]. Three factors of Properties, Experiences and Recommendation as described in [22] were used for the Trust Modelling. Future works proposed include the development of a formal model for revocation afte...
The Turkish Online Journal of Distance Education, 2012
The population of students all over the world is growing without a proportionate increase in teac... more The population of students all over the world is growing without a proportionate increase in teaching/learning resources/infrastructure. There is also much quest for learning in an environment that provides equal opportunities to all learners. The need to provide an equal opportunity learning environment that will hitherto improve the system of education globally has therefore become imperative. Based on our findings, a mathematical model Web-based Virtual Classroom system (WebVCS) was developed to provide a viable medium through which sound education can be offered in tertiary institutions that can carter for varieties of learners irrespective of their abilities, dispositions and geographical locations. Our system model is developed based on active learning approach that adopts blended learning theory (Constructivist-Cognivist learning approach), incorporating e-pedagogy that supports collaboration among participants in the web-based Virtual learning environment. The key objects us...
Hidden Markov Models (HMMs) have been shown to achieve good performance when applied to informati... more Hidden Markov Models (HMMs) have been shown to achieve good performance when applied to information extraction tasks. This paper describes the training aspect of exploring HMMs for the task of metadata extraction from tagged bibliographic references. The main contribution of this work is the improvement of the technique proposed by earlier researchers for smoothing emission probabilities in order to avoid the occurrence of zero values. The results show the effectiveness of the proposed method.
Network and Complex Systems, 2013
This paper is an attempt to substantiate the fact that socio economic issue has to be put into co... more This paper is an attempt to substantiate the fact that socio economic issue has to be put into consideration in any effort at preventing software piracy. A legitimate software owner must be given certain period of grace to cater for unforeseen contingencies during which re-installation is allowed without being counted against him. A mathematical equation - TUSRUC EQUATION (Time Usage of Software in Respect of Unforeseen Contingencies) is developed as an algorithmic function, which shows the way the system handles cases of unforeseen contingencies during the “first time” period of using a software product. These unforeseen contingencies can include the following and not limited to; reformatting of a system, sudden virus attack, system hardware damage. Keywords: Software Piracy, Unforeseen contingencies, TUSRUC
The major challenge of the traditional learning system is space-time restriction and it is teache... more The major challenge of the traditional learning system is space-time restriction and it is teacher-centred. The emergence of Information Technology gave rise for e-learning systems which are characterized with the components of teacher-centred and one-size-fits-all strategy. Subsequently, the concept of personalisation with learning technology was introduced that provides adaptation of learning contents to learning requirements of the learners. Hence, this research paper develops a personalised e-learning system that matches teaching strategy with learners" learning style using Myers-Briggs Type Indicator (MBTI). The emphasis is laid on adaptive teaching strategy and revising the teaching strategy for the purpose of increasing learners" learning performance. The mathematical model is developed for profiling learners to determine their learning style based on the MBTI questionnaire and Dynamic Bayesian Network is applied to revise the teaching strategy. The system is implemented using PHP and Wamp server and the database is designed using Structured Query Language (SQL). The developed system is tested using Undergraduate students studying Information Technology at
Journal of Engineering and Technology, 2017
Wireless Sensor Networks are crucial substructure made up of microcontroller, sensing units and c... more Wireless Sensor Networks are crucial substructure made up of microcontroller, sensing units and communication interfaces designed to enable the users possess the capability to measure, collect and responds to phenomenon within the surrounding been monitored. WSN are viewed as an edge between the physical and the virtual world. More so, the demand of fluid transportation from the production point to the region of end users has led to an increase in the number of pipelines that are fabricated globally. Pipeline infrastructure is generally regarded by many countries as a key element for national development, therefore shielding and observing the pipeline is essential for a successful economy. The current techniques in pipeline monitoring and surveillance include visual inspection, the use of Unmanned Aircraft, Ground Penetrating Radar, Fibre Cabling Technology, and Wireless Sensor Networks. This paper presents the various techniques, strengths and weaknesses when deployed for continuou...
FUOYE Journal of Engineering and Technology, 2021
In recent time, there is an increasing growth in the amount of trading taking place in the curren... more In recent time, there is an increasing growth in the amount of trading taking place in the currency exchange market. However, effective analysis and simulation tools for performing accurate prediction of these exchange rates are lacking. To alleviate this challenge, this work presents an hybrid machine learning and prediction model by suitably combining the Sample Mean Estimator (SME) simulation architecture with the multiple linear regression technique based training of feed-forward parameters. The developed model has the capability to overcome prediction inaccuracy, inconsistent forecasting, slow response due to computational complexity and scalability problems. The SME method is used to overcome the problems of uncertainty and non-linearity nature of the predictive variable as it’s always affected by economic and political factors. The implementation of the proposed currency exchange rate forecasting system is achieved through the use of a developed in-house Java program with Ne...
Nigerian Journal of Technology, 2018
International Journal of Learning, Teaching and Educational Research, 2018
Many literatures have shown the importance of emotion in learning because of their effect on lear... more Many literatures have shown the importance of emotion in learning because of their effect on learner"s performances thereby giving reasons why learners" affective states are crucial to learning. In this light, this research work aims to identify affect-adaptive activities that would improve learning in a personalised ubiquitous learning system by detecting learning style and affective states through some patterns of behaviours. In the study, learners" preference are determined, learners affective states such as confidence, effort, independence and confusion are investigated. The ant colony clustering algorithm is used to determine learners" activities. The four affective states are determined from the learners" forum threads, content activities, assessment, timing, and discussion through learners" engagement. The result of this research on two separate courses, Course A (Affect) and Course B (Non-Affect) shows that the four affective states influence learning. The average mean and standard deviation (SD) value for Course A (Mean=276.23, SD=272.27) over Course B (Mean=200.58, SD=210.51) showed an improvement in learning performance and the t-Test carried out between the courses suggested that students" performance is dependent on their affective states.
Open Computer Science, 2019
Security (privacy, confidentiality and integrity) of pre-electoral, electoral and post electoral ... more Security (privacy, confidentiality and integrity) of pre-electoral, electoral and post electoral phases of the electioneering process is fundamental to the success of Electronic Voting (E-Voting) Systems. Crystography, which is the combination of cryptography and steganography could be a fitting ‘tool kit’ for enhancing the security of sensitive election-related information transmitted over public networks, thereby also ensuring free, fair and credible election/voting. Most of the existing secure e-voting systems are based on public key cryptographic schemes like RSA and Elliptic Curve Cryptography (ECC), whose security depends on the difficulty of solving Integer Factorization Problem (IFP) and Discrete Logarithm problem (DLP) respectively. However, techniques for solving IFP and DLP problems, improves continually. One of such is the quantum algorithm discovered by Peter Shor in 1994, which can solve both IFP and DLP problems in polynomial time. Consequently, the existence of quant...
Oriental journal of computer science and technology, 2016
Social networking website creates new ways for engaging people belonging to different communities... more Social networking website creates new ways for engaging people belonging to different communities, moral and social values to communicate and share valuable knowledge, therefore creating a large amount of data. The importance of mining social media cannot be over emphasized, due to significant information that are revealed which can be applied in different areas. In this paper, a systematic approach for traversing the content of weblog, considering location and time (spatiotemporal) is proposed. The proposed model is capable of searching for subjects in social media using Boyer Moore Horspool (BMH) algorithm with respect to location and time. BMH is an efficient string searching algorithm, where the search is done in such a way that every character in the text needs not to be checked and some characters can be skipped without missing the subject occurrence. Semantic analysis was carried out on the subject by computing the mean occurrence of the subject with the corresponding predica...
Journal of Internet Technology and Secured Transaction, 2014
Biometric Technology is fast taking over from the conventional use of ID Cards, PINs, Tokens and ... more Biometric Technology is fast taking over from the conventional use of ID Cards, PINs, Tokens and Passwords. This is becoming essential because of the issues of forgotten passwords, stolen ID Cards, compromised tokens and spoofed PINs. Palm-print authentication for access control has been deployed in so many areas of security concern in developing countries. Even though it is still in the theoretical stage in Nigeria, this paper seeks to evaluate the stages involved in the processing of palm-print images for identification or human authentication. It focuses on the feature extraction stage which is where the required features are separated from the others. T
Acta Informatica Pragensia, 2016
Wireless Sensor Networks (WSNs) are densely and largely deployed in a variety of environments to ... more Wireless Sensor Networks (WSNs) are densely and largely deployed in a variety of environments to sense real-world events. Many approaches have been proposed for collecting sensory data in any wireless sensor networks in a flexible, reliable, and efficient manner. In this study, we design an efficient mobile agent-based model for data gathering in wireless sensor networks to achieve energy and timely collection of sensory information in the target scene. The current focus in wireless sensor networks is placed on energy optimization during data gathering, processing and transmission. Mobile Agents (MAs) as a piece of a program have attracted growing research interest that travels the network from node to node to compute the local data to get useful information globally. Mobile agent’s features such as autonomy, social ability, learning, and more significantly, mobility makes it a chosen technology for information processing in wireless sensor networks and other resource constrained co...
International Journal of Information Technology and Computer Science, 2016
Insecurity is one of the major challenges that the entire world is facing now, each country havin... more Insecurity is one of the major challenges that the entire world is facing now, each country having their peculiar security issues. The crime rate in every part of the society these days has become a threatening issue such that vehicles are now used for co mmitting criminal activities mo re than before. The issue of vehicle theft has increased tremendously, mostly at gunpoint or car parks. In view of these, there is a need for adequate records of stolen, identified and recovered vehicles which are not readily available in our society and as such very important. The development of a vehicle theft alert and location identification system beco mes more necessary for vehicle o wners to ensure theft prevention and a speedy identification towards recovery efforts in situations where a vehicle is missing, stolen or driven by an unauthorized person. The theft alert function makes use of a GSM applicat ion developed and installed in a mobile phone device wh ich is embedded in the vehicle to communicate with the vehicle owner's mobile phone. The communicat ion is established via SMS (i.e. between the installed mobile phone device and that of the vehicle owner). The co mmunications established include; (i). Sending an SMS alert fro m installed mobile phone device to vehicle owner mobile phone when the car ignition is put on. (ii). Sending an SMS fro m the vehicle owner's mobile phone to start and stop the installed mobile phone device application. The location identificat ion function makes use of a web application developed to; (i). Determine the real time location of a vehicle by means of tracking using GPS. (ii). Broadcast missing or stolen vehicle informat ion to social media and security agency. The implementation of the installed mobile phone device application was done using JAVA because of its capabilit ies in programming mobile applications while PHP and MySQL was used for the web application functions. Integration testing of the system was carried out using simple percentage calculation for the performance evaluation. Fifty seven (57) vehicle owners were sampled and questionnaires were d istributed to them in order to ascertain the acceptability and wo rkab ility of the developed system. The result obtained shows the effectiveness of the system and hence it can be used to effectively monitor vehicle as it is been driven within or outside its jurisdiction. More so, the system can be used as database of missing, identified or recovered vehicles by various security agencies.
International Journal of Cloud Computing and Services Science, Apr 13, 2014
The emergence of cloud computing hold a promise to computing where software is provided as a serv... more The emergence of cloud computing hold a promise to computing where software is provided as a services (SaaS) via the Internet. Mobile cloud computing integrates cloud computing with mobile devices. By this architecture, certain challenges (e.g., battery life, storage, and bandwidth) of mobile devices are addressed. Cloud computing provides the foundation for mobile cloud computing through the delivery of services, software, storage and computational capacity over the Internet, thereby reducing cost, increasing storage, improving battery life of mobile devices and providing flexibility and mobility of data and information. However, the realization of some of these benefits is far from reality in mobile applications, as a result, opens new areas of research such as security of privacy and services. To better understand how to facilitate the development of mobile cloud computing, we surveyed existing work in mobile cloud computing in the context and principles of its foundational cloud computing technology. We provided a definition of mobile cloud computing and gave a summary of results from this review, in particular, the models, architecture, applications and challenges of mobile cloud computing. We concluded with recommendations for how this better understanding of mobile cloud computing can assist in the development of better and stronger mobile applications.
IFIP International Federation for Information Processing
Security of networking systems has been an issue since computer networl<s became prevalent, most ... more Security of networking systems has been an issue since computer networl<s became prevalent, most especially now that Internet is changing the facie computing, hitrusions pose significant threats to the integrity, confidentiality and availability of information for the internet users. In this paper, a new approach to real-time network anomaly intrusion detection via Fuzzy-Bayesian is proposed to detect malicious activity against computer network; the framework is described to demonstrate the effectiveness of the technique. The combination of fuzzy with Bayesian classifier will improve the overall performance of Bayes based intrusion detection system (IDS). Also, the feasibility of our method is demonstrated by the experiment performed on KDD 1999 IDS data set.
International Journal of Computer Applications, 2015
It is a common knowledge in this current age that the challenge is no more the availability of in... more It is a common knowledge in this current age that the challenge is no more the availability of information but accessing the appropriate information. This challenge is attributed to the fact that information is highly unstructured. An innovative technology called XML Topic Map (XTM) is used to address the challenge. However, the technology is equally associated with an issue known as dead links as a result of lack of maintenance which causes a lot of time wastage thereby making the technology not very effective. Therefore, this paper presents an XTM-based system using News domain as case study to solve the issue of dead links. The system is a three-tier architecture implemented with Java Server Pages (JSP). The study offers a time saving system that would assist user to identify URLs that are dead in XTMbased applications as soon as user access topic.
International Journal of Computer Applications, 2014
The use of integrating technology with learning has been a pivot that transformed the role of ins... more The use of integrating technology with learning has been a pivot that transformed the role of instructors and students; and makes it both technology-driven and learner-centric controlmediated. It has been a research-based issue in connecting technology and learning theories for effective learning performance. Learning should be a platform where students are actively engaged in a process to construct a realistic and meaningful knowledge suitable to solve an impressing and confronting societal problems for sustainable development. The approach to learning has been in diverse ways from the fundamental principles of learning theories and strategies. The emphasis of learning is in making it a platform where students can be attracted to it to study effectively, for easy retention and recall and able to apply the knowledge acquisition to futuristic similar real-world problems. Many researchers have worked along with this school of thought; all is to enhance study performance of students. Hence, the research paper develops a framework of e-learning system that engages students in active cognitive tasks to enhance their learning performance.