Temitope O Awodiji | University of the Cumberlands (original) (raw)
Videos by Temitope O Awodiji
With large amounts of unstructured data being produced every day, organizations are trying to ext... more With large amounts of unstructured data being produced every day, organizations are trying to extract as much relevant information as possible. This massive quantity of data is collected from a variety of sources, and data analysts and data scientists use it to create a dashboard that provides a complete picture of the organization's performance. Dashboards are business intelligence (BI) reporting tools that collect and show key metrics and key performance indicators (KPIs) on a single screen, enabling users to monitor and analyze business performance at a glance. An objective assessment of the company's overall performance, as well as of each department, is provided. If each department has access to the dashboard, it may serve as a springboard for future discussion and good decision-making. The goal of this article is to explain in detail the implementation of the Dashboard and how it works, which will serve as a blueprint for building an effective dashboard with respect to best pract
66 views
Examine Database Security Fundamentals That Help To Make Sure High Levels of Flexibility in Dat... more Examine Database Security Fundamentals
That Help To Make Sure High Levels of Flexibility in
Data Use, And Effectiveness in Data Protection
33 views
Abstract: Based on Information and Communication Technologies (ICT) fast advancement and the int... more Abstract:
Based on Information and Communication Technologies (ICT) fast advancement and the integration of advanced analytics into manufacturing, products, and services, several industries face new opportunities and at the identical time challenges in maintaining their ability and market desires. Such integration, which is termed Cyber-physical Systems (CPS), is remodeling the industry to a future level. CPS facilitates the systematic conversion of big data into information that reveals invisible patterns of deterioration and inefficiency and leads to better decision-making. This project focuses on existing trends within the development of industrial huge information analytics and CPS.
41 views
Conference Presentations by Temitope O Awodiji
Conference: 2nd International Conference on NLP Techniques and Applications (NLPTA 2021), 2021
With large amounts of unstructured data being produced every day, organizations are trying to ext... more With large amounts of unstructured data being produced every day, organizations are trying to extract as much relevant information as possible. This massive quantity of data is collected from a variety of sources, and data analysts and data scientists use it to create a dashboard that provides a complete picture of the organization's performance. Dashboards are business intelligence (BI) reporting tools that collect and show key metrics and key performance indicators (KPIs) on a single screen, enabling users to monitor and analyse business performance at a glance. An objective assessment of the company's overall performance, as well as of each department, is provided. If each department has access to the dashboard, it may serve as a springboard for future discussion and good decision-making. The goal of this article is to explain in detail the implementation of Dashboard and how it works, which will serve as a blueprint for building an effective dashboard with respect to best practices for dashboard design.
Conference: 7th International Conference on Software Engineering and Applications (SOFEA 2021), 2021
Databases are vulnerable. Public statements by Target, Home Depot, and Anthem following their ext... more Databases are vulnerable. Public statements by Target, Home Depot, and Anthem following their extremely advertised data breaches are each uniform and succinct on how their breaches unfolded: unauthorized access to those systems that ultimately led to the extraction of sensitive information. A comprehensive strategy to secure a database is over data security. Usually, security events will be related to the later action: illegitimate access to data confidentiality damage, injury to the integrity of knowledge, and loss of data accessibility (Discover). Loss of privacy of data, creating them accessible to others without a right of access is not visible within the database and does not need changes deductible database. This paper addresses these events to confirm database security.
Papers by Temitope O Awodiji
Journal of Multidisciplinary Engineering Science and Technology (JMEST), 2023
In the context of global health, it is crucial to both stop COVID-19 from spreading and completel... more In the context of global health, it is
crucial to both stop COVID-19 from spreading
and completely eradicate it. The United States of
America is one of the nations in the globe that
has suffered from the pandemic's outbreak. To
inform readers and stop the pandemic from
spreading, this study intends to establish a
framework for effectively using machine learning
and data visualization. To understand how
predictions can be generated from visualized
data and how to prepare for the pandemic’s
effects, this study investigates the potential and
opportunities in machine learning. The
combination of domain knowledge per
introspective theoretical insights, current data
sources, and the efficient application of
statistical tools results in a wealth of advanced
data quality and application options.
This research utilizes three multi-variate machine
learning methods, such as Support vector
machines (SVM), neural networks (NN), and
Bayesian networks, to anticipate and stop the
spread of the epidemic. (BN). The numbers of
infections, recoveries, deaths, and vaccinations
within three months are tested using these
algorithms. The performance of each machine
learning method was evaluated using three
statistical parameters: Root Means Squared Error
(RMSE), Mean Absolute Error (MAE), and
Explained Variance Score (EVS). The findings
showed that Bayesian Network (BN) and Neural
Network (NN) performed better as predictive
mechanisms than other models, and the overall
finding suggested that while the spread of the
viral disease might not slow down, the
vaccination rate might be slowed down, and the
number of fatalities will keep reducing.
Journal of Multidisciplinary Engineering Science and Technology (JMEST), 2024
In this study, 10 communities in the North Western area of New Mexico are used to examine the eff... more In this study, 10 communities in the North Western area of New Mexico are used to examine the efficacy of Crime Prevention Through Environmental Design (CPTED) concepts in urban settings. The research looks at the connection between crime rates and urban architecture in Luna by combining secondary data from the Unified Crime Report (UCR) with findings from earlier studies on topography and architectural features. It is accepted that several CPTED initiatives have limitations, such as dependence on secondary data and the need for more thorough research, even while they show promise in lowering crime and improving safety. Among the recommendations are the inclusion of primary data collecting and the consideration of socioeconomic issues. Policymakers, urban planners, and community stakeholders may establish more fair and effective methods to promote safer urban environments by considering these recommendations. By providing insights into the challenges of creating surroundings that support community safety and well-being, this study adds to the continuing conversation on crime prevention and urban planning.
Journal of Multidisciplinary Engineering Science and Technology (JMEST), 2024
Cathodic protection is a corrosion control method that gives optimum protection against corrosion... more Cathodic protection is a corrosion control method that gives optimum protection against corrosion for Stainless and Galvanised Steel in marine environments. This project
Computer Engineering and Intelligent Systems, 2023
The data that matters to executives in the United States industry includes machine performance da... more The data that matters to executives in the United States industry includes machine performance data, maintenance and service data, and production data. This data improves machine performance, reduces downtime, and increases efficiency. The individuals who need this data include executives, maintenance and service personnel, and production managers. The methods of ensuring that the critical data reaches the users have industrial big data analytics, implementing a robust data management system, and training personnel. The use of big data analytics in various industries has been growing rapidly over the past few years. The industrial sector has seen significant benefits from implementing big data analytics. This research paper explores the potential of future maintenance and service innovation in the United States industrial sector using big data analytics, the benefits of being data-driven, and implementing a data-driven process strategy in the United States industrial sector. The paper explains the key data sources, storage, and processing techniques currently used in the industry to gather and analyze data. The paper also identifies the challenges and methodologies in leveraging big data analytics to drive maintenance and service operations innovation. The study will focus on identifying the data that matters most to executives in the industry, determining who needs it, and exploring methods for ensuring the critical data is effectively communicated to its intended users. Additionally, the paper will examine recent advances and terminologies in big data analytics, the methodology for designing innovation-based industries, presents the theoretical background and hypotheses, and examine limitations and future research opportunities in the field.
Journal of Marketing and Consumer Research, 2022
Decision trees have generally become an important tool for every decision maker, both as individu... more Decision trees have generally become an important tool for every decision maker, both as individuals and as an organization. Individuals are prone to strategic decision making every day of their lives as there are always various options for their daily activities. Organizations on the other hand need to be meticulous in their decision making as decisions can make or mar such organization and as well, can help in achieving the aims and visions of such organizations, hence, the need for strategic management practices. This study therefore seeks to examine the importance of the decision tree analysis in strategic management of US retail industries such as Amazon, Walmart and Costco. The study therefore adopted the case study research design among other research designs in order to achieve its objectives due to the concentration of the study on US retail industries (Amazon, Walmart and Costco) while employing the deductive research approach to draw conclusions from the observations made from the case study. The population of the study were the retail industries in US and data was collected from secondary sources such as journals, publications and so on. These data were analysed using the systematic review method which gave room to buttress some salient information concerning the case studies. The study therefore revealed that these retail industries have utilized the decision tree to make salient decisions in their various companies while strategically managing their organizations and recommends that organizations should have a clear description of the decision tree in any decision they are making as it has proven to always have an optimal result.
Temitope Olubunmi Awodiji, 2022
The opportunity for potential attackers to use more advanced techniques to exploit more people wh... more The opportunity for potential attackers to use more advanced techniques to exploit more people who are online is growing. These methods include getting visitors to click on dangerous URLs that could expose them to spam and ads, financial fraud, defacement of their website, and malware. In this study, we tested different machine learning algorithms against a set of harmful URLs to see how well they worked overall and how well they found malware, spam, defacement, or phishing. The ISXC-URL-2016 dataset from the University of New Brunswick was used to make the dataset. The data was evaluated in Weka using the Random Forest, Decision Tree, Naïve Bayes, and Support Vector Machine algorithms. Each evaluation had a split of 80% of the data and a 5-fold, 10fold, or 15-fold cross-validation. It was found that the 10-fold Random Forest algorithm correctly categorized 98.8% of the dataset's cases with the most accuracy. The results of this experiment showed that machine learning can be a useful tool for companies that want to improve their security. Despite different limitations encountered in the completion of this research, This study is the most comprehensive available on the use of practices relevant to Malware detection.
With large amounts of unstructured data being produced every day, organizations are trying to ext... more With large amounts of unstructured data being produced every day, organizations are trying to extract as much relevant information as possible. This massive quantity of data is collected from a variety of sources, and data analysts and data scientists use it to create a dashboard that provides a complete picture of the organization's performance. Dashboards are business intelligence (BI) reporting tools that collect and show key metrics and key performance indicators (KPIs) on a single screen, enabling users to monitor and analyze business performance at a glance. An objective assessment of the company's overall performance, as well as of each department, is provided. If each department has access to the dashboard, it may serve as a springboard for future discussion and good decision-making. The goal of this article is to explain in detail the implementation of the Dashboard and how it works, which will serve as a blueprint for building an effective dashboard with respect to best pract
66 views
Examine Database Security Fundamentals That Help To Make Sure High Levels of Flexibility in Dat... more Examine Database Security Fundamentals
That Help To Make Sure High Levels of Flexibility in
Data Use, And Effectiveness in Data Protection
33 views
Abstract: Based on Information and Communication Technologies (ICT) fast advancement and the int... more Abstract:
Based on Information and Communication Technologies (ICT) fast advancement and the integration of advanced analytics into manufacturing, products, and services, several industries face new opportunities and at the identical time challenges in maintaining their ability and market desires. Such integration, which is termed Cyber-physical Systems (CPS), is remodeling the industry to a future level. CPS facilitates the systematic conversion of big data into information that reveals invisible patterns of deterioration and inefficiency and leads to better decision-making. This project focuses on existing trends within the development of industrial huge information analytics and CPS.
41 views
Conference: 2nd International Conference on NLP Techniques and Applications (NLPTA 2021), 2021
With large amounts of unstructured data being produced every day, organizations are trying to ext... more With large amounts of unstructured data being produced every day, organizations are trying to extract as much relevant information as possible. This massive quantity of data is collected from a variety of sources, and data analysts and data scientists use it to create a dashboard that provides a complete picture of the organization's performance. Dashboards are business intelligence (BI) reporting tools that collect and show key metrics and key performance indicators (KPIs) on a single screen, enabling users to monitor and analyse business performance at a glance. An objective assessment of the company's overall performance, as well as of each department, is provided. If each department has access to the dashboard, it may serve as a springboard for future discussion and good decision-making. The goal of this article is to explain in detail the implementation of Dashboard and how it works, which will serve as a blueprint for building an effective dashboard with respect to best practices for dashboard design.
Conference: 7th International Conference on Software Engineering and Applications (SOFEA 2021), 2021
Databases are vulnerable. Public statements by Target, Home Depot, and Anthem following their ext... more Databases are vulnerable. Public statements by Target, Home Depot, and Anthem following their extremely advertised data breaches are each uniform and succinct on how their breaches unfolded: unauthorized access to those systems that ultimately led to the extraction of sensitive information. A comprehensive strategy to secure a database is over data security. Usually, security events will be related to the later action: illegitimate access to data confidentiality damage, injury to the integrity of knowledge, and loss of data accessibility (Discover). Loss of privacy of data, creating them accessible to others without a right of access is not visible within the database and does not need changes deductible database. This paper addresses these events to confirm database security.
Journal of Multidisciplinary Engineering Science and Technology (JMEST), 2023
In the context of global health, it is crucial to both stop COVID-19 from spreading and completel... more In the context of global health, it is
crucial to both stop COVID-19 from spreading
and completely eradicate it. The United States of
America is one of the nations in the globe that
has suffered from the pandemic's outbreak. To
inform readers and stop the pandemic from
spreading, this study intends to establish a
framework for effectively using machine learning
and data visualization. To understand how
predictions can be generated from visualized
data and how to prepare for the pandemic’s
effects, this study investigates the potential and
opportunities in machine learning. The
combination of domain knowledge per
introspective theoretical insights, current data
sources, and the efficient application of
statistical tools results in a wealth of advanced
data quality and application options.
This research utilizes three multi-variate machine
learning methods, such as Support vector
machines (SVM), neural networks (NN), and
Bayesian networks, to anticipate and stop the
spread of the epidemic. (BN). The numbers of
infections, recoveries, deaths, and vaccinations
within three months are tested using these
algorithms. The performance of each machine
learning method was evaluated using three
statistical parameters: Root Means Squared Error
(RMSE), Mean Absolute Error (MAE), and
Explained Variance Score (EVS). The findings
showed that Bayesian Network (BN) and Neural
Network (NN) performed better as predictive
mechanisms than other models, and the overall
finding suggested that while the spread of the
viral disease might not slow down, the
vaccination rate might be slowed down, and the
number of fatalities will keep reducing.
Journal of Multidisciplinary Engineering Science and Technology (JMEST), 2024
In this study, 10 communities in the North Western area of New Mexico are used to examine the eff... more In this study, 10 communities in the North Western area of New Mexico are used to examine the efficacy of Crime Prevention Through Environmental Design (CPTED) concepts in urban settings. The research looks at the connection between crime rates and urban architecture in Luna by combining secondary data from the Unified Crime Report (UCR) with findings from earlier studies on topography and architectural features. It is accepted that several CPTED initiatives have limitations, such as dependence on secondary data and the need for more thorough research, even while they show promise in lowering crime and improving safety. Among the recommendations are the inclusion of primary data collecting and the consideration of socioeconomic issues. Policymakers, urban planners, and community stakeholders may establish more fair and effective methods to promote safer urban environments by considering these recommendations. By providing insights into the challenges of creating surroundings that support community safety and well-being, this study adds to the continuing conversation on crime prevention and urban planning.
Journal of Multidisciplinary Engineering Science and Technology (JMEST), 2024
Cathodic protection is a corrosion control method that gives optimum protection against corrosion... more Cathodic protection is a corrosion control method that gives optimum protection against corrosion for Stainless and Galvanised Steel in marine environments. This project
Computer Engineering and Intelligent Systems, 2023
The data that matters to executives in the United States industry includes machine performance da... more The data that matters to executives in the United States industry includes machine performance data, maintenance and service data, and production data. This data improves machine performance, reduces downtime, and increases efficiency. The individuals who need this data include executives, maintenance and service personnel, and production managers. The methods of ensuring that the critical data reaches the users have industrial big data analytics, implementing a robust data management system, and training personnel. The use of big data analytics in various industries has been growing rapidly over the past few years. The industrial sector has seen significant benefits from implementing big data analytics. This research paper explores the potential of future maintenance and service innovation in the United States industrial sector using big data analytics, the benefits of being data-driven, and implementing a data-driven process strategy in the United States industrial sector. The paper explains the key data sources, storage, and processing techniques currently used in the industry to gather and analyze data. The paper also identifies the challenges and methodologies in leveraging big data analytics to drive maintenance and service operations innovation. The study will focus on identifying the data that matters most to executives in the industry, determining who needs it, and exploring methods for ensuring the critical data is effectively communicated to its intended users. Additionally, the paper will examine recent advances and terminologies in big data analytics, the methodology for designing innovation-based industries, presents the theoretical background and hypotheses, and examine limitations and future research opportunities in the field.
Journal of Marketing and Consumer Research, 2022
Decision trees have generally become an important tool for every decision maker, both as individu... more Decision trees have generally become an important tool for every decision maker, both as individuals and as an organization. Individuals are prone to strategic decision making every day of their lives as there are always various options for their daily activities. Organizations on the other hand need to be meticulous in their decision making as decisions can make or mar such organization and as well, can help in achieving the aims and visions of such organizations, hence, the need for strategic management practices. This study therefore seeks to examine the importance of the decision tree analysis in strategic management of US retail industries such as Amazon, Walmart and Costco. The study therefore adopted the case study research design among other research designs in order to achieve its objectives due to the concentration of the study on US retail industries (Amazon, Walmart and Costco) while employing the deductive research approach to draw conclusions from the observations made from the case study. The population of the study were the retail industries in US and data was collected from secondary sources such as journals, publications and so on. These data were analysed using the systematic review method which gave room to buttress some salient information concerning the case studies. The study therefore revealed that these retail industries have utilized the decision tree to make salient decisions in their various companies while strategically managing their organizations and recommends that organizations should have a clear description of the decision tree in any decision they are making as it has proven to always have an optimal result.
Temitope Olubunmi Awodiji, 2022
The opportunity for potential attackers to use more advanced techniques to exploit more people wh... more The opportunity for potential attackers to use more advanced techniques to exploit more people who are online is growing. These methods include getting visitors to click on dangerous URLs that could expose them to spam and ads, financial fraud, defacement of their website, and malware. In this study, we tested different machine learning algorithms against a set of harmful URLs to see how well they worked overall and how well they found malware, spam, defacement, or phishing. The ISXC-URL-2016 dataset from the University of New Brunswick was used to make the dataset. The data was evaluated in Weka using the Random Forest, Decision Tree, Naïve Bayes, and Support Vector Machine algorithms. Each evaluation had a split of 80% of the data and a 5-fold, 10fold, or 15-fold cross-validation. It was found that the 10-fold Random Forest algorithm correctly categorized 98.8% of the dataset's cases with the most accuracy. The results of this experiment showed that machine learning can be a useful tool for companies that want to improve their security. Despite different limitations encountered in the completion of this research, This study is the most comprehensive available on the use of practices relevant to Malware detection.