Browsing by Author "Abidoye, A. P."
Now showing 1 - 5 of 5
Results Per Page
Sort Options
Item Context-Aware Stemming Algorithm for Semantically Related Root Words(IEEE, 2012-06) Agbele, Kehinde K.; Adesina, A. O.; Azeez, N. A.; Abidoye, A. P.There is a growing interest in the use of context-awareness as a technique for developing pervasive computing applications that are flexible and adaptable for users. In this context, however, information retrieval (IR) is often defined in terms of location and delivery of documents to a user to satisfy their information need. In most cases, morphological variants of words have similar semantic interpretations and can be considered as equivalent for the purpose of IR applications. Consequently, document indexing will also be more meaningful if semantically related root words are used instead of stems. The popular Porter’s stemmer was studied with the aim to produce intelligible stems. In this paper, we propose Context-Aware Stemming (CAS) algorithm, which is a modified version of the extensively used Porter’s stemmer. Considering only generated meaningful stemming words as the stemmer output, the results show that the modified algorithm significantly reduces the error rate of Porter’s algorithm from 76.7% to 6.7% without compromising the efficacy of Porter’s algorithm.Item A Dependable Model for Attaining Maximum Authentication Security Procedure in a Grid Based Environment(Trends in Applied Sciences Research, 2012) Agbele, Kehinde K.; Azeez, N. A.; Abidoye, A. P.; Adesina, A. O.Grid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). Since this technology allows aggregation of various computer systems for usage by different users to run applications, the information stored on it which may be sensitive and private, remains vulnerable. According to related research on the attribute based access control for grid computing there is no adequate and appropriate security mechanism to authorize and authenticate users before accessing information on a grid system. The issue of security in grid technology has not been fully addressed even though it is a precondition for optimizing grid usability. Having realized the paucity of security guarantees, this research work focuses on developing a model for securing data and applications deployed on a grid on the basis of double identity authentication and public key. The implementation of the model has undoubtedly guaranteed the security of sensitive information on a grid vis-a-vis strict adherence to security policies and protocols.Item Peer-to-Peer Computing and Grid Computing: Towards a Better Understanding.(The Pacific Journal of Science and Technology, 2011-05) Agbele, Kehinde K.; Azeez, N. A.; Abidoye, A. P.; Adesina, A. O.; Tiko, Iyamu; Venter, I. M.Currently, both Peer-to-Peer Computing (P2P) and Grid Computing have remained the most vibrant and useful forms of distributed computing all over the world. Their applications are such that they cut across both academia and industry. It has come to the notice of researchers that there are great misunderstanding and misinterpretation on what these forms of distributed computing actually portend and stand for. In this paper therefore, we take a critical look at comparative study of both computing technologies with aim of making readers understand in a clear cut what each really stands for. To have a good comparison, we start by giving a well referenced definition of Grid Computing as well as Peer-toPeer Computing. Also, we used technical issues and general features in our comparison vis-à-vis the architecture, security issue, data movement, application deployment, and operating system requirement. We also considered the strength of both distributed computing system and finally we considered what could be the future of both technologiesItem Statistical interpretations of the turnaround time values for a scalable 3-tier grid-based computing architecture statistical interpretations of the turnaround time values for a scalable 3-tier grid-based computing architecture(GESJ: Computer Science and Telecommunications, 2013) Agbele, Kehinde K.; Azeez, N. A.; Abidoye, A. P.; Adesina, A. O.; Venter, I. M.; Oyewole, A. S.The concept of scalability for the survival and full-scale implementation as well as efficient utilisation of any distributed system, particularly grid computing, cannot be over-emphasised. It is through this security concept that inter-domain and intra-domain resource sharing, distribution and aggregation can be adequately ensured and guaranteed. This paper is an extension of a paper titled “Towards achieving scalability and interoperability in a triple-domain grid-based environment (3DGBE)” presented at the Information Security for South Africa (ISSA), conference, 2012. The objective of this paper is to provide a comprehensive statistical analysis of the values obtained for the turnaround times for the three domains observed against the number of grid nodes when scalability was being evaluated using ANOVA. Further results obtained also give a summary of the statistical analysis of the values obtained with respects to the three domains vis-à-vis the mean ( , standard deviation and the variance using ANOVA. The essence of the statistical interpretation of these values is to affirm and confirm the significance difference in the mean of group of the three domains considered with respect to variation in the number of grid nodes as well as the number of service requesters as presented.Item Threats to E-Government Implementation in the Civil Service: Nigeria as a Case Study(The Pacific Journal of Science and Technology, 2012) Agbele, Kehinde K.; Azeez, N. A.; Abidoye, A. P.; Adesina, A. O.; Venter, I. M.; Oyewole, A. S.The rapid advancement in Information and Communication Technology (ICT) has undoubtedly influenced positive changes in carrying out administrative functions in government institutions. The ICT adoption rate in Africa is not impressive when compared to the more developed countries of the world. Nigeria, as a case study in this scenario, has also not implemented E-Government impressively, according to the required standards set up by the International Telecommunications Union (ITU). A comprehensive study conducted on the application and implementation of E-Government in Nigeria has provided some metrics that examine the stumbling blocks for realization of adequate and efficient E-Government implementation in the civil service. The research was carried out in the federal civil service in Nigeria in two phases namely, pre-IT implementation phase and post-IT implementation phase. Our findings reveal that ICT implementation will remain elusive in the civil service as long as the as threats explained below remain unaddressed. It has therefore been asserted that the need to overcome these threats is a precondition for realization of E-Government implementation in the federal civil service