OLUWADARE SAMUEL ADEBAYO picture
OLUWADARE SAMUEL ADEBAYO

Publication

Publisher:
  INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Publication Type:
 Journal
Publication Title:
 BIOMETRIC PERSONAL IDENTIFICATION ON 2D WAVELET TRANSFORM AND CHI-SQUARED MODEL
Publication Authors:
 TaiwoTunde Adeniyi, Olatubosun Olabode,Gabriel B. Iwasokun , Samuel A. Oluwadare, Raphael O. Akinyede
Year Published:
 2015
Abstract:
Iris recognition system consists of image acquisition, iris preprocessing, iris segmentation and feature extraction with comparism (matching) stages. The biometric based personal identification using iris requires accurate iris segmentation for successful identification or recognition. Recently, several researchers have implemented various methods for segmentation of boundaries which will require a modification of some of the existing segmentation algorithms for their proper recognition. Therefore, this research presents a 2D Wavelet Transform and Chi-squared model for iris features extraction and recognition. Circular Hough Transform was used for the segmentation of the iris image. The system localizes the circular iris and pupil region and removes the occluding eyelids and eyelashes. The extracted iris region is normalized using Daugman’s rubber sheet model into a rectangular block with constant dimensions to account for imaging inconsistencies. Finally, the phase data (iris signature) from the 2D wavelet transform data is extracted, forming the biometric template. The chi-squared distance is employed for classification of iris templates and recognition. Implementing this model can enhance identification. Based on the designed system, an FAR (False Acceptances ratio) of 0.00 and an FRR (False Rejection Ratio) of 0.896 was achieved. 
Publisher:
 Journal Of ICT, 10, Pp: 99–115
Publication Type:
 Journal
Publication Title:
 COMPUTER-AIDED SYSTEM FOR MODELLING MACHINERY PROCUREMENT DUE-DATE PREDICTION IN PRODUCTION INDUSTRIES
Publication Authors:
 Basil O. Akinnuli, Samuel A. Oluwadare,
Year Published:
 2015
Abstract:
Machinery procurement is carried out in both government and private sectors. One of the major criteria for the selection of vendors is their ability to meet the due-date of supply. Failure to meet the supply due-date will affect installation time, commissioning time, as well as start- up date negatively. The set target for the period will be difficult to meet and working overtime to recover the lost period will cause over-flogging of machine, increase in wear rate which can lead to the life-span reduction of the machine. To arrest this situation, a stochastic model was developed to predict machinery/equipment procurement flow time and set due-date for the supply of the machine by the vendor. The model utilized data on the procurement activities which were analysed based on optimistic, most likely and pessimistic time for each activity. The stochastic model used Project Evaluation and Review Techniques (PERT) for analysing these three time estimates from which expected time was predicted. The model accommodates procurement strategic decisions, flow chart development, data collection form, network analysis, activities paths determination and critical path identification. This research was able to develop a model for machinery procurement, develop computer software for implementing the model and validate the effectiveness of the model using an existing company as case study. The expected completion time is 45 days, with variance of 2 days while the probability of supplying the machine in not more than 2 days is 86%. This model will find application in small, medium and large scale industries in both developing and developed countries. 
Publisher:
 Journal Of ICT, 10, Pp: 99–115
Publication Type:
 Journal
Publication Title:
 A REVIEW OF GAME THEORY APPROACH TO CYBER SECURITY RISK MANAGEMENT
Publication Authors:
 D. A. Akinwumi, G. B. Iwasokun, B. K. Alese And S. A. Oluwadare
Year Published:
 2015
Abstract:
Cybersecurity is among the most complex and rapidly evolving is sues and has been the focus of present day organizations. Cyber security risk management is the process of managing or reducing potentially harmful and uncertain events that posse as threats to cyber security. It involves looking at what could go wrong on the cyber space an d deciding on ways to prevent or minimize their occurrences or effects. One of the prominent cyber security risk management techniques is the Game Theoretic Approach (GTA), which focuses on the use of resources, internal controls, information sharing, tech nical improvements, behavioral or organizational scale - ups and cyber insurance for c y b e r r i s k m a n a g e m e n t. T h i s p a p e r p r e s e n t s a r e v i e w o f g a m e t h e o r e ti c - b a s e d m o d e l f o r c y b e r s e c u r it y r i s k management. Specifically, issues on modeling, some related works a nd significance of game theoretic approach to cyber security risk management are presented. Findings from the review revealed the peculiarities and specificity of each model. It is also revealed that the models are just evolving and require much improvement 
Publisher:
 Proceedings Of Informing Science & IT Education Conference (InSITE) 2015, 5977
Publication Type:
 Conference
Publication Title:
 Contributory Indices To Cybercrime Activities In Nigeria
Publication Authors:
 O. K. Akinyokun, B. K. Alese, S. A. Oluwadare, O. Iyare, And G. B. Iwasokun
Year Published:
 2015
Abstract:
The arrival of Internet has turned the world into a global village where geographical location or distance has to some extent ceased to be a major obstacle to communication and movement of goods and services. This development has also brought with it cybercrime and its level of sophistication. A lot of measures and institutions are being put in place to minimize the incidence of cybercrime in different countries; also, efforts are being made to identify the contributing factors to cybercrime. This research however, adopts a factor analytic approach to formulate the indices that may contribute to the perpetration of cybercrime. A total of seventy three (73) indices were formulated and used to design a structured questionnaire which was administered on five classes of respondents, using purposive and simple random sampling techniques. The data obtained were analyzed by means of factor analysis by principal component using Statistical Package for Social Sciences (SPSS). Ten factors were extracted and subjected to orthogonal rotation using promax. The contributing factors identified in this study could assist stakeholders to combat the menace of cybercrime. 
Publisher:
 Journal Of Computer And Communications, 2015, 3, 100-110
Publication Type:
 Journal
Publication Title:
 Automatic Table Recognition And Extraction From Heterogeneous Documents
Publication Authors:
 Florence Folake Babatunde, Bolanle Adefowoke Ojokoh, Samuel Adebayo Oluwadare
Year Published:
 2015
Abstract:
This paper examines automatic recognition and extraction of tables from a large collection of heterogeneous documents. The heterogeneous documents are initially pre-processed and converted to HTML codes, after which an algorithm recognises the table portion of the documents. Hidden Markov Model (HMM) is then applied to the HTML code in order to extract the tables. The model was trained and tested with five hundred and twenty six self-generated tables (three hundred and twenty-one (321) tables for training and two hundred and five (205) tables for testing). Viterbi algorithm was implemented for the testing part. The system was evaluated in terms of accuracy, precision, recall and f-measure. The overall evaluation results show 88.8% accuracy, 96.8% precision, 91.7% recall and 88.8% F-measure revealing that the method is good at solving the problem of table extraction. 
Publisher:
 Information Management And Business Review,
Publication Type:
 Journal
Publication Title:
 Women Perceptions And Uses Of Information And Communication Technologies In Nigeria And China: A Comparative Analysis
Publication Authors:
 Ojokoh, B.A, , Zhang M., Oluwadare S.A, Akintola, K.G.
Year Published:
 2013
Abstract:

nil

 
Publisher:
 Advanced Materials Research Journal, Trans-Tech Publications Ltd., Zurich, Switzerland
Publication Type:
 Journal
Publication Title:
 Computer-Aided System For Job-Shop Flow-Time And Due-Date Prediction
Publication Authors:
 Akinnuli, B.O., Oluwadare, S.A. And Aderoba, A.A
Year Published:
 2012
Abstract:

nil

 
Publisher:
 International Journal Of Applied Research In Computer Science And Information Technology (IJAR-CSIT)
Publication Type:
 Journal
Publication Title:
 Analytic Study Of The Level Of Incursion Of ICT In The Nigerian Local Governments.
Publication Authors:
 Iwasokun, G.B, Olabode, O. And Oluwadare, S.A.
Year Published:
 2012
Abstract:
Information and Communication Technology (ICT) has continued to wade in increasing influence in various fields of human endeavours. It has been playing prominent roles in areas such as education, security, management, research, relationship, governance and so on. This research featured thirty six (36) indices of ICT that were formulated by the authors for the statistical analysis of the incursion level of ICT in the administration and governance at the local governments in Nigeria. Four hundred and sixty three (463) out of seven hundred and seventy four (774) local governments in the states across the six geopolitical zones were surveyed by administering questionnaires. Meetings were also held in some of the surveyed local governments with principal and other selected staff to verifying the authenticity of the data supplied. The raw data derived from the survey formed the basis for the Factor Analysis by Principal Components (FAPC) using SPSS. The analysis led to the extraction of six factors; namely Communication and development, financial and social commitments, services, welfare and harmony, record and data management and staff development. These factors present or define the extent to which ICT had contributed to governance in the Nigerian local governments. The percentage contributions of the extracted factors fell short of 100 indicating that some other (extraneous) factors, whose related indices were not considered in the research, exist with vital contributions to the current level of ICT in the local governments. Among such extraneous factors are security of lives and properties, political stability, government policy on ICT and ICT literacy level. For the estimation of the contribution of each respondent to each of the extracted factors, the factor score coefficient matrix was generated. The matrix also provided means of ranking the respondents based on the weight of their assessments 
Publisher:
 Research Journal In Organizational Psychology & Educational Studies
Publication Type:
 Journal
Publication Title:
 Nigeria Visual Arts In A Globalized World: The Challenges Of Information And Communication Technology (ICT).
Publication Authors:
 *Ogunlade, B. A, Femi Kayode And Oluwadare, S. A
Year Published:
 2012
Abstract:

nil

 
Publisher:
 Journal Of Research In Sciences, Federal University Of Technology, Akure,
Publication Type:
 Journal
Publication Title:
 A Cross Sectional Analysis Of The Impact Of Global System For Mobile Communication (GSM) On Crime And Transportation: A Case Study Of Akure, Ondo State, Nigeria. FUTA
Publication Authors:
 Oluwadare, S.A. And Iwasokun, G.B
Year Published:
 2012
Abstract:

nil