Mathematics and Computer Science
Permanent URI for this community
Browse
Browsing Mathematics and Computer Science by Issue Date
Now showing 1 - 20 of 81
Results Per Page
Sort Options
Item Inflation: How Much is Too Much for Economic Growth in Nigeria(Springer: Indian Economic Review, 2006) FABAYO, JOSEPH ADEMOLA; AJILORE, OLUBANJO TAIWOThis study follows the methodology of Khan and Sendhadji (2001) to examine the existence of threshold effects in the inflation-growth relationship, using Nigeria data for the period 1970 to 2003. The results suggest the existence of inflation threshold level of 6 percent. Below this level, there exists significantly positive relationship between inflation and economic growth, while above this threshold level, inflation retards growth performance. Sensitivity analyses conducted confirmed the robustness of these results. This finding suggests that bringing inflation down to single digits should be the goal of macroeconomic management in Nigeria, while the optimal inflation target for policy in NigeriaItem Text Messaging: a tool in e-Health Services(Medwell Journals, 2010) Agbele, Kehinde K.; Adesina, Ademola O.; Nyongesa, Henry O.HIV/AIDS continues to be a menace to the global community, especially in sub-Saharan Africa and South Africa is not an exception. The infection rate is continues to grow, in particular, among the young adults. Cell phones have been identified as one of the tools that can be used to overcome the challenge of information dissemination regarding HIV/AIDS among young adults because of its acceptability within this age group. Access to appropriate information can be a powerful for prevention and management of many chronic illnesses, including hypertension, diabetes and HIV/AIDS. Within the young adults age group information access by use of Short Messaging Services (SMS) becomes particularly appealing. In this regard, it is proposed to provide access to carefully screened information on HIV/AIDS within the context of frequently asked questions (FAQ) system. However, automating SMS-based information search and retrieval poses significant challenges because of the inherent noise in SMS communications. In the paper, a special corpus of SMS messages was collected based on a standardised question-answer collection. The SMS messages were then analysed, transcribed and classified, with the aim of building a dictionary of SMS-speak to English translations, with reference to HIV/AIDS.Item Digital Watermarking: A State-of-the-Art Review(IST-Africa 2010 Conference Proceedings, 2010) Agbele, Kehinde K.; Adesina, Ademola O.; Nyongesa, Henry O.Digital watermarking is the art of embedding data, called a watermark, into a multimedia object such that the watermark can be detected or extracted later without impairing the object. Concealment of secret messages inside a natural language, known as steganography, has been in existence as early as the 16th century. However, the increase in electronic/digital information transmission and distribution has resulted in the spread of watermarking from ordinary text to multimedia transmission. In this paper, we review various approaches and methods that have been used to conceal and preserve messages. Examples of real-world applications are also discussedItem lCT and Information Security Perspectives in E-Health Systems(Journal of Mobile Communication, 2010) Agbele, Kehinde K.; Nyongesa, Henry; Adesina, Ademola O.This study examines issues pertinent to the rapidly evolving use of information as a currency of modem economies. Access to information has important benefits that can be achieved in many areas including, social-economic development, education and healthcare. In healthcare, for example, access to appropriate information can minimize visits to physicians and periods of hospitalization for patients suffering from chronic conditions, such as asthma, diabetes, hypertension and HIV/AIDS. This will in turn reduce the cost of healthcare provision. This study examines theoretical and conceptual aspects of E-health as an lCT application area. Various definitions are presented in order to expound concepts associated with E-health. In the study, the links to a successful chain of trust to manage patient health records for E-health deployment are described. These are based on four technology pillars: identity management, asset management, data storage and information security. Practical solutions for integration of E-health with human, material and financial resources are explored.Item Engaging ICTs as a “Tool” for eHealth prioritization on human development and poverty reduction in the African region(Institute of Electrical and Electronics Engineers (IEEE) Inc., 2011) Agbele, Kehinde K.; Adesina, Ademola O.; Ekong, Daniel; Seluwa, DeleThe association connecting information and communication technologies (ICTs) and well-being or poverty remains vague and research today has resulted to divergent conclusions. This paper defines ICTs as “tools” that facilitate communication and the processing and transmission of information and the sharing of knowledge by electronic means. In the African region context, we examine ICTs utilization that aims to improve the provision, access and information management in the health sector. This paper considers access to information as very important benefits that can be achieved in many areas including economic growth, education and healthcare. In healthcare, the roles that ICT plays in ensuring that health information is provided to healthcare providers and consumers to support improving the health of individuals and strengthening health systems, disease detection and prevention are crucial to development and poverty reduction as stated in the UN’s MDGs. For example, access to appropriate information can minimise visits to physicians and periods of hospitalisation for patients suffering from chronic conditions, such as asthma, diabetes, hypertension and HIV/AIDS. This will in turn reduce the cost of healthcare provision. ICTs have the potential to impact almost every aspect of health sector. The paper then proposed how ICTs can be used to reduce poverty and ensure that health information is well administered and reaches the right people, at the right time and in the right form.Item A Novel Document Ranking Algorithm That Supports Mobile Healthcare Information Access Effectiveness(Academic Journals Inc., 2011) Agbele, Kehinde K.; Adesina, Ademola O.; Azeez, Nureni A.; Abidoye, Ademola P.; Febba, RonaldThis study presented DROPT; an acronym for Document ranking Optmization algorithm approach, a new idea for the effectiveness of meaningful retrieval results from the information source. Proposed method extracted the frequency of query keyword terms that appears within the user context of Frequently Asked Questions (FAQ) systems on HIV/AIDS content related-documents. The SMS messages were analyzed and then classified, with the aim of constructing a corpus of SMS related to HIV/AIDS. This study presented a novel framework of Information Retrieval Systems (IRS) based on the proposed algorithm. The developed DROPT procedure was used as an evaluation measure. This “Term Frequency-Inverse Document Frequency (TFIDF)” method was applied to obtain the experimental result that was found promising in ranking documents not only the order in which the relevant documents were retrieved, but also both the terms of the relevant documents in feedback and the terms of the irrelevant documents in feedback might be useful for relevance feedback, especially to define its fitness function (mean weight).Item UDCA: Energy Optimization III Wireless Sensor Networks Using Uniform Distributed Clustering Algorithms(Academic Journals, 2011) Agbele, Kehinde K.; Abidoye, A. P.; Azeez, N. A.; Adesina, A. OTransceivers are the major energy consumption in a Wireless Sensor Network which is made of low-power, small in size, low cost and multi-functional nodes. These sensor nodes are operated by batteries which put significant constraint to the energy available to them. Each sensor node collects sensed data and forwards it to a single processing centre called the base station which uses all reported data to detect an event or determine the changes in an environment. In present study, we propose energy optimization in Wireless Sensor Networks (WSNs) using uniform distributed clustering algorithms. One ofthe algorithms distributes cluster heads uniformly in each cluster and each non -cluster head transmit its data to the cluster heads with short distance which reduces the communication distance of each node. Thus, minimizes the energy consumption of sensor nodes. The second algorithm generates cluster heads in hierarchical form in order to transmit the aggregate data to the base station. It was observed that there is increase in energy savings as we move from bottom up in the hierarchy. Both UDCA protocol and Low Energy Adaptive Cluster Hierarchy protocol (LEACH) were simulated. The simulation results show significant reduction in energy consumption of sensor nodes and cluster heads are more uniformly distributed among all nodes in UDCA compare with LEACH and extend the wireless sensor networks lifetime.Item Peer-to-Peer Computing and Grid Computing: Towards a Better Understanding.(The Pacific Journal of Science and Technology, 2011-05) Agbele, Kehinde K.; Azeez, N. A.; Abidoye, A. P.; Adesina, A. O.; Tiko, Iyamu; Venter, I. M.Currently, both Peer-to-Peer Computing (P2P) and Grid Computing have remained the most vibrant and useful forms of distributed computing all over the world. Their applications are such that they cut across both academia and industry. It has come to the notice of researchers that there are great misunderstanding and misinterpretation on what these forms of distributed computing actually portend and stand for. In this paper therefore, we take a critical look at comparative study of both computing technologies with aim of making readers understand in a clear cut what each really stands for. To have a good comparison, we start by giving a well referenced definition of Grid Computing as well as Peer-toPeer Computing. Also, we used technical issues and general features in our comparison vis-à-vis the architecture, security issue, data movement, application deployment, and operating system requirement. We also considered the strength of both distributed computing system and finally we considered what could be the future of both technologiesItem Using Wearable Sensors for Remote Healthcare Monitoring System(Scientific Research, 2011-05-22) Abidoye, Ademola P.; Azeez, Nureni A.; Adesina, Ademola O.; Agbele, Kehinde K.; Nyongesa, Henry O.Recent technological advances in wireless communications and wireless sensor networks have enabled the design of low-cost, intelligent, tiny, and lightweight medical sensor nodes that can be strategically placed on human body, create a wireless body area network (WBAN) to monitor various physiological vital signs for a long period of time and providing real-time feedback to the user and medical staff. WBANs promise to revolutionize health monitoring. In this paper, medical sensors were used to collect physiological data from patients and transmit it to Intelligent Personal digital Assistant (IPDA) using ZigBee/IEEE802.15.4 standard and to medical server using 3G communications. We introduced priority scheduling and data compression into the system to increase transmission rate of physiological critical signals which improve the bandwidth utilization. It also extends the life time of hand-held personal server by reducing power consumption during transmission.Item ANCAEE: A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks(Scientific Research, 2011-08-31) Abidoye, Ademola P.; Azeez, Nureni A.; Adesina, Ademola O.One of the major constraints of wireless sensor networks is limited energy available to sensor nodes because of the small size of the batteries they use as source of power. Clustering is one of the routing techniques that have been using to minimize sensor nodes’ energy consumption during operation. In this paper, A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks (ANCAEE) has been proposed. The algorithm achieves good performance in terms of minimizing energy consumption during data transmission and energy consumptions are distributed uniformly among all nodes. ANCAEE uses a new method of clusters formation and election of cluster heads. The algorithm ensures that a node transmits its data to the cluster head with a single hop transmission and cluster heads forward their data to the base station with multi-hop transmissions. Simulation results show that our approach consumes less energy and effectively extends network utilization.Item Ensuring the security and privacy of information in mobile health-care communication systems(South African Journal of Science, 2011-09-02) Adesina, Ademola O.; Agbele, Kehinde K.; Februarie, Ronald; Abidoye, Ademola P.; Nyongesa, Henry O.The sensitivity of health-care information and its accessibility via the Internet and mobile technology systems is a cause for concern in these modern times. The privacy, integrity and confidentiality of a patient’s data are key factors to be considered in the transmission of medical information for use by authorised health-care personnel. Mobile communication has enabled medical consultancy, treatment, drug administration and the provision of laboratory results to take place outside the hospital. With the implementation of electronic patient records and the Internet and Intranets, medical information sharing amongst relevant health-care providers was made possible. But the vital issue in this method of information sharing is security: the patient’s privacy, as well as the confidentiality and integrity of the health-care information system, should not be compromised. We examine various ways of ensuring the security and privacy of a patient’s electronic medical information in order to ensure the integrity and confidentiality of the information.Item A Query-Based SMS Translation in Information Access System(International Journal of Soft Computing and Engineering (IJSCE), 2011-11) Agbele, Kehinde K.; Adesina, Ademola O.; Nureni, Azeez A.; Abidoye, Ademola P.Mobile technology has contributed to the evolution of several media of communication such as chats, emails and short message service (SMS) text. This has significantly influenced the traditional standard way of expressing views from letter writing to a high-tech form of expression known as texting language. In this paper we investigated building a mobile information access system based on SMS queries. The difficulties with SMS communication were explored in terms of the informal communication passage and the associated difficulty in searching and retrieving results from an SMS-based web search engine under its non-standardization. The query is a pre-defined phrase-based translated English version of the SMS. The SMS machine tool normalization algorithm (SCORE) was invented for the query to interface with the best ranked and highly optimized results in the search engine. Our results, when compared with a number of open sources SMS translators gave a better and robust performance of translation of the normalized SMS.Item Threats to E-Government Implementation in the Civil Service: Nigeria as a Case Study(The Pacific Journal of Science and Technology, 2012) Agbele, Kehinde K.; Azeez, N. A.; Abidoye, A. P.; Adesina, A. O.; Venter, I. M.; Oyewole, A. S.The rapid advancement in Information and Communication Technology (ICT) has undoubtedly influenced positive changes in carrying out administrative functions in government institutions. The ICT adoption rate in Africa is not impressive when compared to the more developed countries of the world. Nigeria, as a case study in this scenario, has also not implemented E-Government impressively, according to the required standards set up by the International Telecommunications Union (ITU). A comprehensive study conducted on the application and implementation of E-Government in Nigeria has provided some metrics that examine the stumbling blocks for realization of adequate and efficient E-Government implementation in the civil service. The research was carried out in the federal civil service in Nigeria in two phases namely, pre-IT implementation phase and post-IT implementation phase. Our findings reveal that ICT implementation will remain elusive in the civil service as long as the as threats explained below remain unaddressed. It has therefore been asserted that the need to overcome these threats is a precondition for realization of E-Government implementation in the federal civil serviceItem A novel routing algorithm for energy optimization in wireless sensor networks(Research Journal of Information Technology, 2012) Abidoye, Ademola P.; Azeez, Nureni A.; Adesina, Ademola O.; Agbele, Kehinde K.Wireless sensor networks (WSNs) have become an interesting area to researchers in recent times due to the low cost of sensor nodes, wide application areas and with low or no cost of maintenance after deployment in a target area. Sensor nodes are expected to remain in operation for a longer time without human intervention. However, due to the small size and cost of these nodes, they have been equipped with small batteries with limited energy source. This has been a major constraint to WSNs, since in most cases sensor nodes are deployed in large number where it may be difficult or impossible to replace the batteries of each node when they run out of supplying power. In this study, a novel Routing Algorithm for Energy Optimization in WSNs (RAEO) has been proposed to reduce communication distance among the nodes by transmitting sensed data through the shortest path from source node to the base station along the neighbouring nodes. The simulation results show that our approach reduces energy consumption during data transmission and increases networks lifetime compared with MECN and SPIN protocols. Finally, the proposed algorithm reduces protocol propagation delay and packets loss during data transmission.Item Prescriptive System for Performance Information Management System(Frontiers in Science, 2012) Akomolafe, T.; Onyekwelu, Bukola A.; Bello, Oniyide A.Information can be briefly defined as processed data. Information is crucial to the success of any organization because it must be exchanged in one form or the other before activities can be carried out. However, too much information can be overwhelming and lead to poor decision-making. Further, as organizations face an ever-growing wave of digital data, they need to analyze that data and make timely decisions to achieve effective management .Formerly, information was viewed simply as a means of expression, they now serve as the foundation for an organization’s effectiveness and efficiency. Additionally, increased pressures to manage information appropriately, communicate it and effectively manage it for increased performance has been the focus of organizations. In today’s organizations, information is much more dynamic than even just a few years ago. Data; which is the raw material for producing information volumes are exploding, generating larger and larger databases, just as business activities are demanding faster response times. It is therefore compelling to evolve a means by which these loosely located data can be gathered, processed and communicated quickly to meet the challenges of modern business demand. In this study, a prescriptive system for designing a performance information management system was carried out. The system describes the methodology for designing a system that efficiently gathers, processes and makes information available to every level of managementItem A Dependable Model for Attaining Maximum Authentication Security Procedure in a Grid Based Environment(Trends in Applied Sciences Research, 2012) Agbele, Kehinde K.; Azeez, N. A.; Abidoye, A. P.; Adesina, A. O.Grid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). Since this technology allows aggregation of various computer systems for usage by different users to run applications, the information stored on it which may be sensitive and private, remains vulnerable. According to related research on the attribute based access control for grid computing there is no adequate and appropriate security mechanism to authorize and authenticate users before accessing information on a grid system. The issue of security in grid technology has not been fully addressed even though it is a precondition for optimizing grid usability. Having realized the paucity of security guarantees, this research work focuses on developing a model for securing data and applications deployed on a grid on the basis of double identity authentication and public key. The implementation of the model has undoubtedly guaranteed the security of sensitive information on a grid vis-a-vis strict adherence to security policies and protocols.Item Enhancing the Quality of University Education: The Role of Private Universities(Proceedings of the 10th International Conference on Private Higher Education in Africa Organized By St. Mary’s University College in Collaboration with The Association of African Universities (AAU), The African Union Commission (AUC), The Association for the Development of Education in Africa (ADEA), and Covenant University (CU, Nigeria), 2012) Ayo, C.K.,; Eweoya, Ibukun; Ajieh, C.African universities, pre-independence, operated as affiliates of foreign universities and offered quality education. The quality offered was pronounced even post-independence but the military incursion in politics brought about a decline in quality occasioned by poor funding and inadequate infrastructural development. These led to the massive exodus of the university dons to the developed world with better conditions of service, a development that is fondly referred to as “brain drain”. Consequently, most parents, particularly the rich send their children abroad in search of quality education but at the expense of moral upbringing and character development, the overall cost notwithstanding. Private universities came into existence in Nigeria since 1999 and till date, there are about 50 of them while the Public and State universities are 36 each. The Private universities offer a good balance of quality and character modelling and have become the preferred choice for most parents. Therefore, this paper presents the Covenant University model being rated as the most preferred Private University in Nigeria; and renowned for high academic standard and high level of discipline. The innovations in curriculum design, unique and customized programmes as well as the leadership and character development imperatives are also discussed. The parameters for World Class Universities are also presented with the efforts of Covenant University highlighted.Item STABILITY ANALYSIS OF TWO -VARIABLE MODEL FOR COMBUSTION IN SEALED CONTAINER(International Journal of Pure and Applied Mathematics, 2012-01-01) Olajuwon, Bakai I.; Popoola, Amos O.The paper studies a model for combustion of self heating chem- icals which are in drums inside a sealed shipping container. The stability of interacting drums of chemicals is a problem of great importance for the safety of manufacturers, users and handlers of the energetic material. Since the rate of reaction varies rapidly with temperature, the paper objectively examines the role of temperature on stability of the energetic materials and specifically investigates the effect of temperature broadening exponent called numerical exponent on its stability. The criteria for which stable focus, unstable focus and Hopf’s bifurcation may occur in the new model are established. Of major interest is a criterion on the numerical exponent for which maximum ambient temperature could be attained.Item SOLVING RICCATI EQUATION USING ADOMIAN DECOMPOSITION METHOD(International Journal of Pure and Applied Mathematics, 2012-03) Gbadamosi, B.; Adebimpe, O.; Akinola, E.I.; Olopade, I.A.Riccati equation with variable coefficient and constant coefficient is considered. The numerical method based on the Adomian decomposition is introduced to obtained results and compared with the exact solution to show that the Adomian decomposition method is a powerful method for the solution of nonlinear differential equations. The results obtained are presented and show only few term are required to obtain an approximate solution.Item Evaluating SMS Parsing Using Automated Testing Software(African Journal of Computing & ICT, 2012-06) Agbele, Kehinde K.; Adesina, A. O; Abidoye, A. P; Azeez, N. AMobile phones are ubiquitous with millions of users acquiring them every day for personal, business and social usage or communication. Its enormous pervasiveness has created a great advantage for its use as a technological tool applicable to overcome the challenges of information dissemination regarding burning issues, advertisement, and health related matters. Short message services (SMS), an integral functional part of cell phones, can be turned into a major tool for accessing databases of information on HIV/AIDS as appreciable percentage of the youth embrace the technology. The common features by the users of the unique language are the un-grammatical structure, convenience of spelling, homophony of words and alphanumeric mix up of the arrangement of words. This proves it to be difficult to serve as query in the search engine architecture. In this work SMS query was used for information accessing in Frequently Asked Question FAQ system under a specified medical domain. Finally, when the developed system was measured in terms of proximity to the answer retrieved remarkable results were observed.