ADEWALE OLUMIDE SUNDAY picture
ADEWALE OLUMIDE SUNDAY

Publication

Publisher:
 Nigerian Journal Of Technological Research 9(2).
Publication Type:
 Journal
Publication Title:
 Performance Evaluation And Modelling Of Internet Traffic Of An Academic Institution: A Case Study Of The Federal University Of Technology, Akure, Ondo State, Nigeria
Publication Authors:
 Dahunsi F., M., Mebawondu J. O. And Adewale O. S.
Year Published:
 2014
Abstract:
Academic institutions require internet services to facilitate research and learning processes for the students and members of staff. More so, the Federal University of Technology, Akure, a technologically oriented institution, deserves viable internet services for these purposes. Optimal performance and continual delivery of adequate service to users would be enhanced by evaluating the performance of the existing internet. This study presents results of finding on the performance of internet service in the university with special reference to parameters such as number of users, protocols used, bytes used, uptime and downtime and dropped packets. Traffic data flows were experimentally captured and measured over a period using relevant measuring tools. The results presented summarize the performance of the university network and recommendations needed to enhance optimal performance, available and adequate service to all users. 
Publisher:
 Journal Of Internet Technology And Secured Transactions, 3(1):203–209
Publication Type:
 Journal
Publication Title:
 Infrared Capture Of Palm-Vein Blood Vessel Patterns For Human Authentication
Publication Authors:
 Akinsowon O., Boniface Alese B., Adewale O.
Year Published:
 2014
Abstract:
Biometric Technology is fast taking over from the conventional use of ID Cards, PINs, Tokens and Passwords. This is becoming essential because of the issues of forgotten passwords, stolen ID Cards, compromised tokens and spoofed PINs. Palm-print authentication for access control has been deployed in so many areas of security concern in developing countries. This paper evaluates the stages involved in the processing of palm-print images for identification or human authentication. It focuses on the feature extraction stage which is where the required features are separated from the others. 
Publisher:
 International Journal Of Computer Applications, 97(1):1-6.
Publication Type:
 Journal
Publication Title:
 Performance Analysis Of A Prioritised Multilevel Access Allocation Scheme For Data Calls In GSM Networks
Publication Authors:
 Kuboye B. M., Alese B. K., Falaki S. O. And Adewale O. S.
Year Published:
 2014
Abstract:
The demand of voice and data services on the Global System for Mobile Communications (GSM) is unprecedented in the annals of the history of telecommunication systems. As a result, grade of service is no longer stable in the face of this high demand. This paper explores the use of prioritised multilevel access allocation scheme to stem the instability of data services when there is high demand. This paper classifies calls into Handover (HD), Real-Time (RT) and Non-Real-Time (NRT) based on the nature of their service and thereafter, priority was set among them. The HD has the highest priority followed by RT and NRT respectively. The channels in the cell were partitioned into three pools named as q1, q2, and q3. Data and voice calls have different characteristics. Therefore, voice always have priority over data since it cannot tolerate delay in call processing. The q1 is reserved for voice only, q3 reserved for data only while q3 is reserved for handoff calls for both voice and data. 
Publisher:
 In 8th International Conference For Internet Technology And SecurIn Proceedings Of The World Congress On Engineering 2014, I, July 2 - 4, London, U.Ked Transactions (ICITST-2013) Pp. 449–452.
Publication Type:
 Conferenceproceeding
Publication Title:
 Building A Secure Environment For Client-Side Ecommerce Payment System Using Encryption System
Publication Authors:
 Akinyede R. O., Alese B. K., Adewale O. S.
Year Published:
 2014
Abstract:
Client-side computer, network connection between client and merchant web site’s server, web site’s server and software that allow it to run properly have become the target of attackers. Literature has shown that client-side network of the system has become the target of the attackers, this is because it involves buying, and selling and fund transfer by customers, merchants and financial institutions. Unfortunately, many of the researches that have been done in this area have not provided the required solutions. Hence, this paper presents a client-side network security to safeguard information stored on the system from individuals that attempt to gain unauthorised access to data. Architecture of the system is designed by using advanced encryption system–AES encryption/decryption algorithm. The symmetric key cryptosystem can protect transaction data such as account numbers, amount and other payment information from alterations. The system uses the most common method of authentication which is user name and password 
Publisher:
  In Proceedings Of IEEE International Conference On Cloud Computing Technology And Science,
Publication Type:
 Conferenceproceeding
Publication Title:
 A Survey On Mobile Cloud Computing With Embedded Security Considerations
Publication Authors:
 Waziri V. O., Abah J., Adewale O. S., And Abdullahi M. B.
Year Published:
 2014
Abstract:
as a service via the Internet. Mobile cloud computing integrates cloud computing with mobile devices. By this architecture, certain challenges (e.g., battery life, storage, and bandwidth) of mobile devices are addressed. Cloud computing provides the foundation for mobile cloud computing through the delivery of services, software, storage and computational capacity over the Internet, thereby reducing cost, increasing storage, improving battery life of mobile devices and providing flexibility and mobility of data and information. However, the realisation of some of these benefits is far from reality in mobile applications, as a result, opens new areas of research such as security of privacy and services. To better understand how to facilitate the development of mobile cloud computing, this paper presents a survey of the existing work in mobile cloud computing in the context and principles of its foundational cloud computing technology to better understand mobile cloud computing in the development of better and stronger mobile applications. 
Publisher:
 Int. J. Advanced Networking And Applications Volume: 04 Issue: 06 Pages:1766-1771 (2013) ISSN : 0975-0290
Publication Type:
 Journal
Publication Title:
 Deployment Of Multicriteria Decision System For National Youth Service Corps (NYSC)
Publication Authors:
 Afolayan A. Obiniyi, Christiana N. Anujeonye, Olumide S. Adewale
Year Published:
 2013
Abstract:
National Youth Service Corps deployment programme is the process of deploying corps members to their places of primary assignment. This paper focused on the use of multicriteria decision system for deployment exercise of corps members to their places of primary assignment instead of manual method. The model was developed using corps membersí disciplines, genders and tribes among others and requests from organisations. The Multicriteria decision system was implemented using Windows, Apache, MySQL and Hypertext Preprocessor (PHP) Apache as the web server, PHP as script language, MySQL as the relational database system with windows as operating system and it made use of a single client called the web browser. It is expected that the Multicriteria decision system will increase the efficiency, accuracy and timely posting of the Corps members and that the National youth service corps official should implement the use of the system for their deployment exercise. 
Publisher:
 Journal Of Emerging Trends In Engineering And Applied Sciences, 4(3):513-521
Publication Type:
 Journal
Publication Title:
 Identity Management System In Nigeria (IDM): Prospects And Challenges
Publication Authors:
 Adeola S. O.; Falaki S. O.; Adewale O. S. And Adetunmbi A. O.
Year Published:
 2013
Abstract:
Identity management is a critical issue in economic and socio-political well-being of any nation. A nation that cannot boast of knowing her citizens is devoid of peace, economic stability and would not be able to provide adequate security for its citizenries. The recent surge in crime in Nigeria and the attendance violent activities of terrorists demand that more attention be paid to identifying people living in the nation territory. There have been speculations that those responsible for recent wake of bombing activities in Nigeria are foreigners from neighbouring 
Publisher:
 International Journal Of Engineering Research And Technology, 2(6): 2925-2930
Publication Type:
 Journal
Publication Title:
 Effect Of Linear Curved Wavelet Paths In Seismic Oil Exploration Over Kukawa Axios, Borno State, Nigeria
Publication Authors:
 Mbang U. B.; Alese B. K., Adewale O. S. And Enikanselu P. A.
Year Published:
 2013
Abstract:
instead of the ideal curved wave path is undertaken. The study entailed a comparison of the actual depths calculated by the use of straight–line paths with those computed with curved paths which are both determined by the reflection time of a wave from surface to the target bed as well as the velocity of propagation. The strategy adopted in this study was based on the results of an earlier research which made the comparison to be rather between the height (h) obtained by actual measurements and (h’) obtained by the assumption of a straight–line path. Results obtained show that the use of straight lines instead of curved paths introduced an average percentage error of 0.07 which is not significant in terms of the precision of seismic exploration results obtained between 1976–1996 in Kukawa, Borno state, Nigeria. 
Publisher:
 Journal Of Emerging Trends In Engineering And Applied Sciences
Publication Type:
 Journal
Publication Title:
 Treatment Strategies For The Effluents Of Recycled Waste Paper Mills Of Punjab
Publication Authors:
 Adeola S. O., S. O. Falaki, Adewale O. S. And Adetunmbi A. O
Year Published:
 2013
Abstract:
Recycled paper industry is a globally growing industry that consumes a significant amount of resources, raw materials and energy. Due to this fact, minimising the environmental impact of this sector is important. The characteristics of the waste waters generated from various processes of the recycled pulp and paper industry depend upon the types of processes and raw materials, process technology applied, management practices, internal recirculation of the effluent for recovery and the amount of water being used in a particular process. One of the main causes of surface water and ground water contamination is industrial discharge from various industries viz. pulp and paper, textile, pharmaceutical and other chemical industries. These compounds are quite toxic and degrade slowly in the environment. Therefore, it becomes imperative to completely degrade these organic compounds. The incapability of conventional waste water treatment methods to effectively remove many bio-recalcitrant pollutants leads to explore the new efficient and cost–effective treatment systems for the complete degradation of these pollutants. One relevant method is oxidation, and especially the so-called advanced oxidation process (AOP) which consists of the strong action of oxidizing agents, resulting in the generation of very highly reactive hydroxyl radicals. The present study determines the status of the environment pollutants of the effluents of recycled paper and pulp mills and the strategies to remove the organic load. The goal of the study is to evaluate the best effective treatment which can effectively degrade the pollutants present in waste streams. The results show that the best results are obtained using a combined FeSO4.7H2O and CaCO3 processes, with more than 27% degradation of effluents and 55% removal of COD. 
Publisher:
 Intelligent Control And Automation, 4:1-10
Publication Type:
 Journal
Publication Title:
 Generating Recommendation Status Of Electronic Products From Online Reviews
Publication Authors:
 Ojokoh B. A., Olayemi O. C. And Adewale O. S
Year Published:
 2013
Abstract:
The need for effective and efficient mining of online reviews cannot be overemphasized. This position is as a result of the overwhelmingly large number of reviews available online which makes it cumbersome for customers to read through all of them. Hence, the need for online web review mining system which will help customers as well as manufacturers read through a large number of reviews and provide a quick description and summary of the performance of the product. This will assist the customer make better and quick decision, and also help manufacturers improve their products and services. This paper describes a research work that focuses on mining the opinions expressed on some electronic products, providing ranks or ratings for the features, with the aim of summarising them and making recommendations to potential customers for better online shopping. A technique is also proposed for scoring segments with infrequent features. The evaluation results using laptops demonstrate the effectiveness of these techniques.