ADEWALE OLUMIDE SUNDAY picture
ADEWALE OLUMIDE SUNDAY

Publication

Publisher:
 International Journal Of Computational Linguistics (IJCL), 11(1):18-33
Publication Type:
 Journal
Publication Title:
 Development Of Bi-directional English To Yoruba Translator For Real-time Mobile Chatting
Publication Authors:
 (98) Adewale O. S., Agbonifo O. C. And Olaniyan J.
Year Published:
 2020
Abstract:
Machine translation is a subfield of computational linguistics that investigates the use of computer software to translate text or speech from one natural language to another. Translating between English language and Yoruba language comes with some computational complexities such as syntactic and grammatical differences in the language pair. This paper aims at exploring a multi-layer hybridized language translation approach, which combines the Corpus-based and Rule-based approaches of machine translation to generate its outputs. A parallel corpus was built with texts from English and Yoruba languages and stored in MySQL relational database. One hundred and forty–seven computational rules were manually formulated and also stored in MySQL database for generating sentences in both languages. A di-bilingual dictionary was proposed to store words in English with their corresponding Yoruba counterparts and their equivalent parts of speech while the other dictionary stored words in Yoruba with their corresponding English counterparts and their equivalent parts of speech. A real time mobile chatting interface was developed for users’ interactions with themselves and the system. The research model was implemented using PHP for server-side scripting, JSON for data interchange and Java programming language for user interfaces accessible on users’ mobile phones. The Java programming language was coded in Android Studio 3.0 Integrated Development Environment. Two hundred and eleven sentences from Contemporary English Grammar were used for system testing and the result shows 95% accuracy compare with Google Translate. 
Publisher:
 International Journal Of Smart Security Technologies,7(2).
Publication Type:
 Journal
Publication Title:
 An Enhanced Computational Fusion Technique For Security Of Authentication Of Electronic Voting System
Publication Authors:
 Adewale O. S., Boyinbode O. And Salako E. A.
Year Published:
 2020
Abstract:
The detection of a false individual who had not been enrolled as a genuine participant in an election could be potentially detected in electronic voting systems as against paper-based methods. In recent time, one-time password and biometrics have been used to curtail false acceptance of imposters. However, imposters had unlawfully stolen the credentials of genuine individuals, gained unauthorised access, and polled illegitimate votes due to poor authentication methodology. The accuracy of a multi-biometric system is a function of the data type used and fusion method adopted. This paper presented a computational fusion approach that involved the use of fingerprint and randomly generated voter identification number to effectively satisfy the authentication security requirement of the electronic voting system. New architectural and mathematical equations on the proposed approach were presented to tackle the problem of false acceptance rate and improve on the true acceptance rate of a biometric system. Algorithm to achieve the proposed approach was presented in this paper as well. 
Publisher:
 Journal Of Digital Innovations & Contemporary Research In Science, Engineering & Technology, 7(1):1–12
Publication Type:
 Journal
Publication Title:
 An Innovative Strategy For Satisfying Data Integrity Requirement Of Electronic Voting System
Publication Authors:
 Adewale, O. S., Boyinbode, O. K. And Salako, E. A
Year Published:
 2020
Abstract:
corrupt politicians strategically buy votes, engage political thugs to snatch ballot boxes, pay election officers to manipulate results and pay fraudsters to intercept and alter the election results along the communication channels for selfish gains. However, a series of attempts such as passwords, secure hash functions, message authentication code, have been made to curtail the unlawful practices of results’ modification by fraudsters. The existing approaches have issues on data authentication, data repudiation and integrity. This paper presented a new technique that would satisfy the data integrity requirement of the electronic voting system using fingerprints. The paper proposed a mathematical technique that would fuse the fingerprints of polling and collation officers. It was highlighted that the technique would solve the problems of passive and active attacks on sensitive election results thereby satisfying the integrity demand of the electronic voting system. Future work would involve the implementation and evaluation of the technique presented in this paper using standard metrics. 
Publisher:
 Scientific African 9:1–16
Publication Type:
 Journal
Publication Title:
 Hybrid Intelligent Model For Real Time Assessment Of Voice Quality Of Service
Publication Authors:
 Mebawondu J. O., Dahunsi F. M. And Adewale O. S.
Year Published:
 2020
Abstract:
Mobile telecommunication has made an unprecedented positive impact on every nation's economy and social life. It has allowed users to save time and money in their daily transactions and improved their quality of life. However, network inaccessibility, unreliability, and unsatisfactory voice service have led to many complaints from clients. One of the significant weaknesses inferred from the literature review is the lack of reliable user-based information for monitoring and performance evaluation. The paper proposed a hybrid model for the assessment of voice calls quality of service (QoS) offered by mobile network operators based on standard performance metrics. A performance analysis was carried out on the proposed models. The experimental study is carried out using the network data collected from volunteer's mobile phones using the host-based crowdsourced technique. The collected user-based data for QoS metrics is modelled based on the combination of the Fuzzy Logic algorithm and Takagi Sugeno Kang inference mechanism of the Neuro-Fuzzy model. The model was implemented using MATLAB and Weka analytics as front end and MySQL as backend on Windows 10 operational environment. The performance evaluation of the hybrid model shows the high accuracy of 97.10%; the true positive rate and precision rates were 95.5% and 97.47%, respectively. 
Publisher:
 International Journal Of Information Engineering And Electronic Business, 2020, 1, 19-29.
Publication Type:
 Journal
Publication Title:
 A Review Of Electronic Voting Systems: Strategy For A Novel
Publication Authors:
 Adewale O. S., Boyinbode O. K. And Salako E. A
Year Published:
 2020
Abstract:
The voting system in the world has been characterised with many fundamental challenges, thereby resulting to a corrupt contestant winning an election. Researchers have been emotionally, physically, socially and intellectually concerned about the election malpractices recorded at various levels of electing a representative. Questions on how corrupt stakeholders in elections could be prevented from fraudulent activities such as rigging and impersonation called for discussion and answers. Consequences of declaring a corrupt contestant as a winner are bad governance, insecurities and diversification of public funds for personal gains. There must be approaches to tackle the problems of voting systems. This paper focused on a comprehensive review of electronic voting systems by different scholars as a platform for identifying shortcomings or drawbacks towards the implementation of a highly secured electronic voting system. The methods used by different scholars were technically reviewed so as to identify areas that need improvement towards providing solutions to the identified problems. Furthermore, countries with history on the adoption of e-voting systems were reviewed. Based on the problems identified from various works, a novel for future work on developing a secured electronic voting system using fingerprint and visual semagram techniques was proposed. 
Publisher:
 International Journal Of Information Engineering And Electronic Business, 2020, 1, 19-29.
Publication Type:
 Journal
Publication Title:
 Visual Semagram: An Enhanced Technique For Confidentiality Requirement Of Electronic Voting System
Publication Authors:
 Adewale O. S., Boyinbode O. K. And Salako E. A.
Year Published:
 2020
Abstract:
One of the rights of citizens in any democratic society is to freely elect a particular candidate into a specific office for governance. This implies that among the candidates participating in an election, one of them would emerge as a winner based on the specified rules and regulation. The recent reports on the election in different parts of the world revealed that the corrupt politicians and corrupt election officers did manipulate the sensitive results thereby leading to undesired candidate emerge as a winner. This implies that election results had not been adequately secured against an attack such as alteration for false results. This paper reviewed scholarly published work and presented a novel technique using visual semagram to satisfy the confidentiality requirement of the electronic voting system. The mathematical equations on how the three primary additive colours (Red, Green and Blue) could be used to modify and conceal the election results against suspicion and alteration were presented. The significance of this paper included the presentation of a technique that would conceal any sensitive message from attackers’ suspicion and scholarly piece of information for further investigation in handling insecurity issues. The future work would involve the implementation and evaluation of the proposed technique to achieve the confidentiality requirement of the e-voting system, and to establish the validity and reliability of proposed technique. 
Publisher:
 In Proceedings Of 2020 International Conference In Mathematics, Computer Engineering And Computer Science
Publication Type:
 Conferenceproceeding
Publication Title:
 Enhancing Network Life-time Of Wireless Sensor Networks Through Itinerary Definition And Mobile Agents For Routing Among Sensor Nodes
Publication Authors:
 Egwuche O. S., Adewale O. S., Oluwadare S. A. And Daramola O. A.
Year Published:
 2020
Abstract:
Mobile agents-based wireless sensor networks offer a good alternative to the conventional client/server network model. Mobile agent is a computational code that is injected inside a packet that migrates among sensor nodes for data collection. The itinerary planning for mobile agent is the most challenging task during mobile agents’ migration in wireless sensor networks. In this study, a routing itinerary scheme for multi-mobile agent itinerary planning for energy efficiency in wireless sensor networks by constructing the spanning tree of wireless sensor nodes is formulated. The itinerary paths of the mobile agent are defined using minimum spanning tree. It is assumed that the sink node is equipped with all the information about the sensor nodes so that the sink can calculate the weights between cluster heads. The proposed energy-aware mobile agent-based model performed better than least energy adaptive clustering hierarchy, local closest first and global closest first. 
Publisher:
 I-manager’s Journal On Software Engineering
Publication Type:
 Journal
Publication Title:
 Requirement Formalisation For Model Checking Using Extended Backus Naur Form
Publication Authors:
 Aliyu E., Adewale O. S., Adetunmbi O. A., And Ojokoh B
Year Published:
 2019
Abstract:
Describing the structure of a language using rewriting rules in verifying requirements and design is still a vivid area of research. The authors describe the grammar formalism Extended Backus Naur Form (EBNF) to specify the 'if' single block construct with respect to assignment and relational operators as well as Switch, For loop, Do-while, and While loop statement to ensure program free flow. This aim to ensure correctness in the grammar rule for selective and iterative construct to parse C++ programs. The grammar describes the actions a parser must take to parse a string of tokens correctly. 
Publisher:
 International Journal Of Modern Education And Computer Science 11(8):15-26.
Publication Type:
 Journal
Publication Title:
 Appraisal On Perceived Multimedia Technologies As Modern Pedagogical Tools For Strategic Improvement On Teaching And Learning
Publication Authors:
 Salako E. A., Adewale O. S. And Boyinbode O. K.
Year Published:
 2019
Abstract:
Secondary schools as part of the foundational level of education cannot afford to lag behind in using multimedia to improve the intellectual and creative capabilities among the teachers and students. This study investigated multimedia technologies as modern pedagogical tools for strategic improvement on the teaching and learning process. The study adopted a descriptive survey design. The population was the senior secondary school students and teachers in Kuje Area Council of Federal Capital Territory, Nigeria. A simple random sampling technique was used to select 250 students and 100 teachers. Cronbach's alpha statistical tool was used to obtain a reliability coefficient of 0.83 on validated questionnaires which were distributed to collect data from the respondents. Statistically, mean, standard deviation, percentage and partial correlation were used to answer the research questions while t-test and Chi-Square were used to test the postulated hypotheses at 0.05 level of significance. The findings showed that television sets, projectors and computers were the major multimedia facilities used for teaching and learning in the council, multimedia facilities had a high influence on teaching and learning. It was gathered that multimedia enriched teaching cognitive skills and psychomotor skills and developed concretisation of abstraction on any subject matter. Some recommendations were made which included the provision of financial support to procure multimedia facilities to schools towards the attainment of educational objectives, provision of subsiding policies by the government on the importation of multimedia facilities, employment of competent and experienced technical staff should be employed to solve a series of technical problems in using multimedia facilities. Experimental research design on the effectiveness of multimedia facilities as modern pedagogical tools for strategic improvement on teaching and learning was proposed for future work. 
Publisher:
 Open Comput. Sci., 9:292–298.
Publication Type:
 Journal
Publication Title:
 Post-quantum Crystography System For Secure Electronic Voting
Publication Authors:
 Gabriel A. J., Alese B. K., Adetunmbi O. A., Adewale O. S. And Sarumi O. A.
Year Published:
 2019
Abstract:
Security (privacy, confidentiality and integrity) of pre-electoral, electoral and post electoral phases of the electioneering process is fundamental to the success of Electronic Voting (E-Voting) Systems. Crystography, which is the combination of cryptography and steganography could be a fitting ‘tool kit’ for enhancing the security of sensitive election-related information transmitted over public networks, thereby also ensuring free, fair and credible election/voting. Most of the existing secure e-voting systems are based on public key cryptographic schemes whose security depends on the difficulty of solving integer factorisation problem and discrete logarithm problem. Consequently, the existence of quantum computers in the range of 1000 bits would spell doom to systems based on those problems. This paper presents the development of a new crystographic system that combines post quantum cryptography with steganography to ensure that the security of e-voting is maintained both in classical computing era as well as post-quantum computing era. Our experiments’ results shows that our proposed system performed better than existing ones.