Olawale Lawal - Academia.edu (original) (raw)

Olawale Lawal

Uploads

Papers by Olawale Lawal

Research paper thumbnail of Online Social Network Vital to Hospitality and Tourism Marketing and Management

World Academy of Science, Engineering and Technology, International Journal of Hospitality and Tourism Sciences, Oct 18, 2014

Research paper thumbnail of Reduction of High Dimensional Data Using Discriminant Analysis Methods

In recent years, analysis of high dimensional data for several applications such as content based... more In recent years, analysis of high dimensional data for several applications such as content based retrieval, speech signals, fMRI scans, electrocardiogram signal analysis, multimedia retrieval, market based applications etc. has become a major problem. To overcome this challenge, dimensionality reduction techniques, which enable high dimensional data to be represented in a low dimensional space have been developed and deployed for varieties of application to fast track the study of the information structure. In this paper, a comparative study of LDA and a KDA among the dimensionality reduction techniques were considered using data samples collected from survey and it was implemented using object oriented programming language (C#). The results reveal that less data components were discovered by LDA across the different dataset tested in comparison with KDA.

Research paper thumbnail of Reduction of High Dimensional Data Using Discriminant Analysis Methods

International Research Journal of Advanced Engineering and Science, 2019

In recent years, analysis of high dimensional data for several applications such as content based... more In recent years, analysis of high dimensional data for several applications such as content based retrieval, speech signals, fMRI scans, electrocardiogram signal analysis, multimedia retrieval, market based applications etc. has become a major problem. To overcome this challenge, dimensionality reduction techniques, which enable high dimensional data to be represented in a low dimensional space have been developed and deployed for varieties of application to fast track the study of the information structure. In this paper, a comparative study of LDA and a KDA among the dimensionality reduction techniques were considered using data samples collected from survey and it was implemented using object oriented programming language (C#). The results reveal that less data components were discovered by LDA across the different dataset tested in comparison with KDA.

Research paper thumbnail of Usable Authentication Schemes: A Critique

Usable authentication was given birth to as a result of memorability shortcoming; that is, low me... more Usable authentication was given birth to as a result of memorability shortcoming; that is, low memorability of passwords by the users of authentication systems. To improve on the flaws of text based authentication schemes, usable authentication schemes have their architecture based on graphics in different varieties and compositions. This paper first presents several usable authentication schemes that are available, examining the architecture they are based upon. Next is a critique of the architecture of the described usable authentication schemes. Finally, the identified requirement for the described usable authentication systems is reflected upon.

Research paper thumbnail of The Effectiveness of Genetic Algorithm in Solving Simultaneous Equations

International Journal of Computer Applications, 2011

Research paper thumbnail of Online Social Network Vital to Hospitality and Tourism Marketing and Management

World Academy of Science, Engineering and Technology, International Journal of Hospitality and Tourism Sciences, Oct 18, 2014

Research paper thumbnail of Reduction of High Dimensional Data Using Discriminant Analysis Methods

In recent years, analysis of high dimensional data for several applications such as content based... more In recent years, analysis of high dimensional data for several applications such as content based retrieval, speech signals, fMRI scans, electrocardiogram signal analysis, multimedia retrieval, market based applications etc. has become a major problem. To overcome this challenge, dimensionality reduction techniques, which enable high dimensional data to be represented in a low dimensional space have been developed and deployed for varieties of application to fast track the study of the information structure. In this paper, a comparative study of LDA and a KDA among the dimensionality reduction techniques were considered using data samples collected from survey and it was implemented using object oriented programming language (C#). The results reveal that less data components were discovered by LDA across the different dataset tested in comparison with KDA.

Research paper thumbnail of Reduction of High Dimensional Data Using Discriminant Analysis Methods

International Research Journal of Advanced Engineering and Science, 2019

In recent years, analysis of high dimensional data for several applications such as content based... more In recent years, analysis of high dimensional data for several applications such as content based retrieval, speech signals, fMRI scans, electrocardiogram signal analysis, multimedia retrieval, market based applications etc. has become a major problem. To overcome this challenge, dimensionality reduction techniques, which enable high dimensional data to be represented in a low dimensional space have been developed and deployed for varieties of application to fast track the study of the information structure. In this paper, a comparative study of LDA and a KDA among the dimensionality reduction techniques were considered using data samples collected from survey and it was implemented using object oriented programming language (C#). The results reveal that less data components were discovered by LDA across the different dataset tested in comparison with KDA.

Research paper thumbnail of Usable Authentication Schemes: A Critique

Usable authentication was given birth to as a result of memorability shortcoming; that is, low me... more Usable authentication was given birth to as a result of memorability shortcoming; that is, low memorability of passwords by the users of authentication systems. To improve on the flaws of text based authentication schemes, usable authentication schemes have their architecture based on graphics in different varieties and compositions. This paper first presents several usable authentication schemes that are available, examining the architecture they are based upon. Next is a critique of the architecture of the described usable authentication schemes. Finally, the identified requirement for the described usable authentication systems is reflected upon.

Research paper thumbnail of The Effectiveness of Genetic Algorithm in Solving Simultaneous Equations

International Journal of Computer Applications, 2011

Log In