Mathematics and Computer Science
Permanent URI for this community
Browse
Browsing Mathematics and Computer Science by Title
Now showing 1 - 20 of 81
Results Per Page
Sort Options
Item The Adoption of E-Tourism: An Empirical Investigation(Asian Journal of lnformation Technology, 2016) Eweoya, Ibukun; Okuboyejo, Senanu R.; Agomuo, KelechiMan's desire to discover more, enjoy more and acquire more is an llllquenchable thirst which gives relevance to tourism. The act of food-searching, safety and environmental-friendliness search in animals is naturally consistent; this is applicable to humans too and it boosts tourism which involves Customer Reservation Services (CRS), hospitality, airline reservation, car hire reservation and others. E-tourism is a revolution from traditional way of physically present in multiple locations to plan a tour, to achieving numerous tour planning tasks with maximwn convenience using ICT. This research is a smvey research, it investigates the acceptance and adoption of e-tourism in Nigeria, adopting the UTAUT/UTAUT2 model and analyzed the gathered data from the questionnaires using Smart PLS 3 to confirm the reliability and validity of the measurement instruments.Item AGENT-BASED CONTEXT-AWARE HEALTHCARE INFORMATION RETRIEVAL USING DROPT APPROACH(IJIR International Science Press, 2012-12) Agbele, Kehinde K.; Adesina, Ademola; Daniel, Ekong; Dele, SeluwaAs the volume of information available on the Web information systems is growing continuously, browsing this content becomes a tedious task given the presentation of data that does meet user's aims and needs. In this paper, to satisfy user needs, an agent-based paradigm is an appropriate solution which gives outputs suitable to the user in the form of highly ranked documents. Conversely, patient care and a health condition commonly require collaboration between healthcare providers. The emergence of agent's technology motivates radical changes of how information is obtained. This paper addresses this problem by proposing a novel DROPT (Document Ranking OPTimization) measure for information retrieval results to validate the effectiveness of the information management tasks. We propose information retrieval system architecture, which main components are contextaware agent’s technology to meet users' information needs.Item Algorithm for information retrieval optimization(IEEE, 2016-10-13) Agbele, Kehinde K.; Ayetiran, Eniafe F.; Aruleba, Kehinde D.; Ekong, Daniel O.When using Information Retrieval (IR) systems, users often present search queries made of ad-hoc keywords. It is then up to the information retrieval systems (IRS) to obtain a precise representation of the user's information need and the context (preferences) of the information. To address this problem, we investigate optimization of IRS to individual information needs in order of relevance. The goal of this article is to develop algorithms that optimize the ranking of documents retrieved from IRS according to user search context. In particular, the ranking task that led the user to engage in information-seeking behaviour during search tasks. This article discusses and describes a Document Ranking Optimization (DROPT) algorithm for IR in an Internet-based or designated databases environment. Conversely, as the volume of information available online and in designated databases is growing continuously, ranking algorithms can play a major role in the context of search results. In this article, a DROPT technique for documents retrieved from a corpus is developed with respect to document index keywords and the query vectors. This is based on calculating the weight (w ij ) of keywords in the document index vector, calculated as a function of the frequency of a keyword k j across a document. The purpose of the DROPT technique is to reflect how human users can judge the context changes in IR result rankings according to information relevance. This article shows that it is possible for the DROPT technique to overcome some of the limitations of existing traditional (tf × idf) algorithms via adaptation. The empirical evaluation using metrics measures on the DROPT technique carried out through human user interaction shows improvement over the traditional relevance feedback technique to demonstrate improving IR effectiveness.Item AN ANALYSIS OF THE NETWORKED READINESS INDEX DATA OF SOME SUB-SAHARAN AFRICA COUNTRIES(Nigeria Computer Society, 2016-07) Oriogun, P. K.; Adesanya, A. O.; Omolofe, B.; Yara, P. O.; Ogunrinde, R. B.; Akinwumi, Titilayo O.African governments and businesses must accept the concept of Internet of Everything (IoE) by being fully digitized with highly robust computer network security in order to embrace modern technologies in the form of cloud, mobile, social and analytics. They must also realize the importance attached to achieving societal and economic transformation by fully understanding the connection between people, process, data and things in order to create the needed opportunities for African citizens. A country’s Networked Readiness is an ideal indicator of a country’s ability to implement and take a competitive advantage of Information Communication Technologies (ICTs). In this article we investigate 6 sub-Saharan Africa countries (Botswana, Mauritius, Namibia, Nigeria, South Africa and Zimbabwe) in terms of their Networked Readiness Index (NRI) rankings as published in the Global Information Technology Reports (GITR) from 2002 – 2015. We developed a number of statistical models for predicting the NRI for these countries for the next 9 years based on the NRI rankings of these countries in the previous 9 years. Our predictive models for NRI rankings suggest that on average over next the 9 years, the hierarchical ordering is namely, Mauritius (1st), South Africa (2nd), Zimbabwe (3rd), Namibia (4th), Botswana (5th) and Nigeria (6th) respectively. We conclude that in terms of Networked Readiness in Africa during the period of our predictions, data security will be crucial in three areas: confidentiality, integrity and availability. Furthermore, we are of the opinion that programmable security infrastructure (software-based security environment) will have the ability to secure dynamically a particularly sensitive data flow across the network on demand and according to the organization’s security policy.Item ANCAEE: A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks(Scientific Research, 2011-08-31) Abidoye, Ademola P.; Azeez, Nureni A.; Adesina, Ademola O.One of the major constraints of wireless sensor networks is limited energy available to sensor nodes because of the small size of the batteries they use as source of power. Clustering is one of the routing techniques that have been using to minimize sensor nodes’ energy consumption during operation. In this paper, A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks (ANCAEE) has been proposed. The algorithm achieves good performance in terms of minimizing energy consumption during data transmission and energy consumptions are distributed uniformly among all nodes. ANCAEE uses a new method of clusters formation and election of cluster heads. The algorithm ensures that a node transmits its data to the cluster head with a single hop transmission and cluster heads forward their data to the base station with multi-hop transmissions. Simulation results show that our approach consumes less energy and effectively extends network utilization.Item Applying Diffusion of Innovation (DOI) Theory to Mobile Learning For Quality Education(International Journal of Multimedia and Ubiquitous Engineering, 2016) Azeta, A.A; Eweoya, IbukunEmbracing of new learning services using mobile devices can enhance students’ engagement, enthusiasm, reduce cost of textbook and enhance quality of education. Studies on use of mobile devices for learning are on the increase. However, several mobile learning researches have been on adoption of mobile learning with respect to usage. In order to take advantage of potentials of mobile learning, research that addresses the adoption with respect to quality of education is essential. Diffusion of innovation is one of theories used to ascertain the level of adoption and quality of service from mobile learning. This study used the diffusion of innovation (DOI) theory to study the level of adoption and quality derived from using mobile learning in Nigeria. Statistical Package for Social Science (SPSS) was used for data analysis. The results of the findings will provide insights into m-learning usage in Nigeria and other developing countries.Item A Cancelable Biometric Based Security Protocol for Online Banking System(International Journal of Computer Science and Information Security, 2020-06) Tom, Joshua J.; Alese, Boniface K.; Thompson, Aderonke F.The internet revolution has brought significant benefits to humanity. Undeniably, most businesses in both the public and private sectors now provide their services online through the internet. One of the businesses that have embraced the use of the internet to provide services to their customers is the banking sector. Banks obtain competitive advantage and increased productivity through the adoption of online banking. Bank customers enjoy online banking as it provides them with anytime, anywhere banking experience. Away from the benefits is the issue of security of customer transaction data and customer privacy. Many authors have proposed various solutions to address the online banking security problem but while some focus solely on client authentication, others dwell only on security of the data transfer channels. In this paper, we propose a cancellable biometric based authentication protocol which guarantees secure mutual authentication, customer privacy and offer a secure end-to-end transmission of customer transaction data. The protocol in this paper is designed using Biohashing, a biometric template protection technique and dual cryptographic algorithm that combines Advanced Encryption Standard (AES) and Data Encryption Standard algorithms. With these, we realized strong authentication and secure transaction information exchange protocol for online bankingItem Comparative Empirical Analysis of Female University Enrolment in STEM Courses in the Geopolitical Zones in Nigeria(I.J. Modern Education and Computer Science, 2019) Onyekwelu, Bukola A.Though University enrolment in Nigeria is on the increase, more males than females are still being enrolled today, which varies according to discipline as well as from one geopolitical zone of the country to another. This is more pronounced in Science, Technology, Engineering and Mathematics fields, as female enrolment seems to be higher in the commercial and arts courses than the sciences and engineering. Secondary data were obtained from the Nigerian Bureau of Statistics, based on the Joint Admission and Matriculation Board registrations for a period of 5 years, spanning 2011 to 2015. The data were classified based on the six geopolitical zones in Nigeria, and multivariate data analysis, supported by Multivariate Analysis of Variance was carried out on the data. The results obtained revealed that there is still a wide variance in male and female enrolment in these fields, with male enrolment being significantly higher than that of female candidates. It also revealed that female enrolment varies depending on the geopolitical zone, with female enrolment in Science, Technology, Engineering and Mathematics being generally higher in geographical zones in southern Nigeria compared with those in northern Nigeria. The results obtained were further compared with data obtained from previous researches and the comparison was discussed. In addition, this study offers recommendations on how to encourage more female participation in Science, Technology, Engineering, and Mathematics.Item A Context-Adaptive Ranking Model for Effective Information Retrieval System(International Journal of Information Science, 2018) Agbele, Kehinde K.; Ayetiran, Eniafe; Babalola, OlusolaAbstract When using Information Retrieval (IR) systems, users often present search queries made of ad-hoc keywords. It is then up to information retrieval systems (IRS) to obtain a precise representation of user’s information need, and the context of the information. Context-aware ranking techniques have been constantly used over the past years to improve user interaction in their search activities for improved relevance of retrieved documents. Though, there have been major advances in context-adaptive systems, there is still a lack of technique that models and implements context-adaptive application. The paper addresses this problem using DROPT technique. The DROPT technique ranks individual user information needs according to relevance weights. Our proposed predictive document ranking model is computed as measures of individual user search in their domain of knowledge. The context of a query determines retrieved information relevance. Thus, relevant context aspects should be incorporated in a way that supports the knowledge domain representing users’ interests. We demonstrate the ranking task using metric measures and ANOVA, and argue that it can help an IRS adapted to a user's interaction behaviour, using context to improve the IR effectiveness.Item Context-Aware Stemming Algorithm for Semantically Related Root Words(IEEE, 2012-06) Agbele, Kehinde K.; Adesina, A. O.; Azeez, N. A.; Abidoye, A. P.There is a growing interest in the use of context-awareness as a technique for developing pervasive computing applications that are flexible and adaptable for users. In this context, however, information retrieval (IR) is often defined in terms of location and delivery of documents to a user to satisfy their information need. In most cases, morphological variants of words have similar semantic interpretations and can be considered as equivalent for the purpose of IR applications. Consequently, document indexing will also be more meaningful if semantically related root words are used instead of stems. The popular Porter’s stemmer was studied with the aim to produce intelligible stems. In this paper, we propose Context-Aware Stemming (CAS) algorithm, which is a modified version of the extensively used Porter’s stemmer. Considering only generated meaningful stemming words as the stemmer output, the results show that the modified algorithm significantly reduces the error rate of Porter’s algorithm from 76.7% to 6.7% without compromising the efficacy of Porter’s algorithm.Item A Dependable Model for Attaining Maximum Authentication Security Procedure in a Grid Based Environment(Trends in Applied Sciences Research, 2012) Agbele, Kehinde K.; Azeez, N. A.; Abidoye, A. P.; Adesina, A. O.Grid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). Since this technology allows aggregation of various computer systems for usage by different users to run applications, the information stored on it which may be sensitive and private, remains vulnerable. According to related research on the attribute based access control for grid computing there is no adequate and appropriate security mechanism to authorize and authenticate users before accessing information on a grid system. The issue of security in grid technology has not been fully addressed even though it is a precondition for optimizing grid usability. Having realized the paucity of security guarantees, this research work focuses on developing a model for securing data and applications deployed on a grid on the basis of double identity authentication and public key. The implementation of the model has undoubtedly guaranteed the security of sensitive information on a grid vis-a-vis strict adherence to security policies and protocols.Item Development of an Automated University Examination Timetabling System(International Journal of Scientific & Engineering Research, 2016-01) Oluwaniyi, Nathaniel Olufisayo; Afeni, Babajide Olakunle; Onyekwelu, Bukola AbimbolaTimetabling is one of the most important administrative activities that require huge attention of the school authorities in all educational institutions. Part of which has to do with examinations. Examination timetabling is sometimes a serious challenge in most universities. The objective of this work is to design and implement a web-based automated platform for university examination timetabling. The system discussed in this paper was developed using Macromedia Dreamweaver for creating the websites while MySQL serves as the database. The programming languages used consists of HTML (Hypertext Markup Language), PHP (Hypertext Preprocessor), Javascript, CSS (Cascading Style Sheets) and SQL (Structured Query Language). PHP is a scripting language that is embedded in HTML. PHP scripting code is used to connect web pages to MySQL databases to create dynamic web sites. The system was able to successfully schedule the university examination timetable within a few seconds without clashes of invigilators and examination venues. If the system is fully implemented and adopted, it will go a long way to correct the problems encountered during the manual method of examination timetabling in most universitiesItem Digital Watermarking: A State-of-the-Art Review(IST-Africa 2010 Conference Proceedings, 2010) Agbele, Kehinde K.; Adesina, Ademola O.; Nyongesa, Henry O.Digital watermarking is the art of embedding data, called a watermark, into a multimedia object such that the watermark can be detected or extracted later without impairing the object. Concealment of secret messages inside a natural language, known as steganography, has been in existence as early as the 16th century. However, the increase in electronic/digital information transmission and distribution has resulted in the spread of watermarking from ordinary text to multimedia transmission. In this paper, we review various approaches and methods that have been used to conceal and preserve messages. Examples of real-world applications are also discussedItem E-Banking Use Behaviour: E-Service Quality, Attitude, and Customer Satisfaction.(International Journal of Bank Marketing, 2016-05) Ayo, C.K.,; Oni, A.A.; Adewoye, O.J.; Eweoya, I.O.Advances in electronic service technology have created great opportunities as well as threats to organizations including the banking sector. Nigerian banks have invested immensely on electronic services as a measure to meet up with the global standard, reduce transaction cost, provide better services to customers and promote efficiency. While e-banking services are numerous, there is no enough evidence of its acceptance among customers as the volume of cash transaction continues to be on the increase. This study aims at investigating factors affecting e-banking usage based on electronic service (e-service) quality. The survey instrument employed involved administering survey questionnaires to a total of 400 respondents within the Lagos metropolis and its environs. E-services quality integrated with diffusion of innovations (DOI) theory was developed as a conceptual framework for analyzing the factors influencing customer’ satisfaction and usage of e-banking. The model employed reliability, responsiveness, availability, service portfolio and competence as extensions to the constructs of DOI: complexity, compatibility, and relative advantage to better reflect the users’ views. Our result reveals that perceived e-service quality alone had a strong relationship with customer satisfaction and use which means that greater quality of e-service has the potential to increase satisfaction and consequently in more use of e-banking. However, in this research finding, competence of e-service support staff, system availability, service portfolio, responsiveness and reliability, in that order, were found to be most significant in rating e-service quality.Item E-Banking Use Behaviour: E-Service Quality, Attitude, and Customer Satisfaction.(International Journal of Bank Marketing, 2016-05) Ayo, C.K.; Oni, A.A.; Adewoye, O.J.; Eweoya, IbukunAdvances in electronic service technology have created great opportunities as well as threats to organizations including the banking sector. Nigerian banks have invested immensely on electronic services as a measure to meet up with the global standard, reduce transaction cost, provide better services to customers and promote efficiency. While e-banking services are numerous, there is no enough evidence of its acceptance among customers as the volume of cash transaction continues to be on the increase. This study aims at investigating factors affecting e-banking usage based on electronic service (e-service) quality. The survey instrument employed involved administering survey questionnaires to a total of 400 respondents within the Lagos metropolis and its environs. E-services quality integrated with diffusion of innovations (DOI) theory was developed as a conceptual framework for analyzing the factors influencing customer’ satisfaction and usage of e-banking. The model employed reliability, responsiveness, availability, service portfolio and competence as extensions to the constructs of DOI: complexity, compatibility, and relative advantage to better reflect the users’ views. Our result reveals that perceived e-service quality alone had a strong relationship with customer satisfaction and use which means that greater quality of e-service has the potential to increase satisfaction and consequently in more use of e-banking. However, in this research finding, competence of e-service support staff, system availability, service portfolio, responsiveness and reliability, in that order, were found to be most significant in rating e-service quality.Item E-Learning Implementation in Higher Education: Aspects of Infrastructure Development Challenges and Students Learning Approaches(INSPIRE (International Conference for Process Improvement, Research and Education)At: Loughborough University, Leicestershire, United Kingdom, 2017-11) Afolabi, Olaitan. O.,; Uhomoibhi, JamesSuccessful implementation of e-learning in any field of study depends largely on the development and deployment of learning materials using the right infrastructure. In education, there is the need to grant and have access to resources for enhanced learning that would lead to acquisition of the right type of knowledge for gainful employment in industries. E-Learning promotes individual and flexible approach to learning through the use of the right type of infrastructure to facilitate teaching, learning, research and the right type of pedagogy. The infrastructure for e-learning deployment in higher education in advanced countries seemed to be well established compared to those available in developing nations. This paper examines some of the challenges faced by education providers in developing countries in infrastructure development and deployment. These are compared to some of the instances in advanced countries. We investigate the different approaches adopted by students for learning from the perspectives of fully online and blended modes. This paper presents some of the reasons given by learners for engaging in online studies, and also report on suggested ways of addressing the challenges faced by both the teachers and learners in relation to infrastructure development and improvement of education utilizing e-learning.Item Efficient Anonymous Key Exchange Protocol for Roaming in Wireless Networks(International Journal of Scientific Research Engineering & Technology, 2018-02) Tom, Joshua J.; Alese, Boniface K.; Adewale, Olumide S.; Thompson, Aderonke F.Group signature schemes existentially provide anonymity, non-repudiation and can make a mobile device untraceable. But using group signature only in designing anonymous key exchange system is time wasting and consumes much of other computing resources hence the use of it must be minimal especially when deployed on resources-constrained mobile devices. In .this paper, we propose the combined use of group signature because of its inherent security properties which are very important when a mobile user roams in the insecure wireless network and message authentication code to reduce the huge computational burden occasioned by group signature’s expensive public key operations resulting in unbearable authentication latency. In this paper, we built two authenticators, a signature based authenticator and a message authentication code based authenticator. These models are based on the Canetti-Krawczyk model. We implemented the design using Java 8 on Android Studio 2.2 and tested it on Genymotion based emulator on Oracle VM VirtualBox. The experiment result showed a significant reduction in the authentication time when message authentication code based authenticator was executed compared to authentication time result in the group signature based authenticator. We further compared our model with a similar model and find that ours was superior in efficiency measured from authentication latency when a user roams from his home domain to a visited network and other networks subsequently while maintaining same security characteristics.Item An empirical investigation of acceptance, adoption and the use of E-agriculture in Nigeria(Heliyon, 2021-07) Eweoya, Ibukun; Okuboyejo, Senanu R.; Odetunmibi, Oluwole A.; Odusote, Babafemi O.Agriculture is one of the major forces to reckon with in the employment rate and overall economy of any nation. E-agriculture is not yet fully known to all farmers in Nigeria, hence affecting adversely production and the overall business chain. The acceptance and adoption of e-agriculture can make life better and advance the economy faster. This work investigated the acceptance of e-agriculture together with its adoption in Nigeria using questionnaires for data collection. This study seeks to discover to which extent e-agriculture is adopted by diverse categories of people with basic interest on the direct determinants of usage intention and behavior; direct determinant of user behavior, and impact moderators. The Unified Theory of Acceptance and Use of Technology model was adopted and SmartPLS 3.0 was used for the analysis of the collected data. The study establishes that performance expectancy, effort expectancy, social influence and habit were discovered as variables that have significant effect on behavioral intention for the acceptance and adoption of e-agriculture while performance expectancy was discovered to be the most significant factor that influences the usage of e-agriculture in Nigeria. It is recommended that new factors like, quality of service, privacy concerns, and enhanced farmer support can be added as new factors in future works.Item Energizing the Advanced Encryption Standard (AES) for Better Performance(International Journal of Scientific & Engineering Research., 2016-04) Sari, Arif; Rahnama, Behnam; Eweoya, Ibukun; Agdelen, ZaferSecurity is a never ending challenge. The security researchers must be steps ahead to avoid attacks and threats, thereby keeping businesses running and avoiding calamities. The Advanced Encryption Standard (AES) is to this rescue after its official acceptance and recommendation by National Institute of Standards and Technology (NIST) in 2001. However, timing attacks have called for a modification to it to retain its potency and effectiveness. This research boosts the Rijndael by incorporating an invented playfair ciphering into the algorithm using 256 ASCII codes. The concept counters possible leakages from the S-box lookups from the cache. The research introduces mixcolumn in the last round against the standard to make it a constant time algorithm. The encryption and decryption were validated. Previous researches implemented Architectural and operating system modifications, placing all the lookup tables in CPU registers, Parallel Field Programmable Gate Array (FPGA) implementation , Application Specific Integrated Circuits (ASIC) implementation, the Dynamic Cache Flushing Algorithm but none keeps AES assets of good speed and memory conservation; most especially in embedded systems.Item Energizing the Advanced Encryption Standard (AES) for Better Performance(International Journal of Scientific & Engineering Research, 2016-04) Sari, Arif; Rahnama, Behnam; Eweoya, Ibukun; Zafer Agdelen4; Agdelen, ZaferSecurity is a never ending challenge. The security researchers must be steps ahead to avoid attacks and threats, thereby keeping businesses running and avoiding calamities. The Advanced Encryption Standard (AES) is to this rescue after its official acceptance and recommendation by National Institute of Standards and Technology (NIST) in 2001. However, timing attacks have called for a modification to it to retain its potency and effectiveness. This research boosts the Rijndael by incorporating an invented playfair ciphering into the algorithm using 256 ASCII codes. The concept counters possible leakages from the S-box lookups from the cache. The research introduces mixcolumn in the last round against the standard to make it a constant time algorithm. The encryption and decryption were validated. Previous researches implemented Architectural and operating system modifications, placing all the lookup tables in CPU registers, Parallel Field Programmable Gate Array (FPGA) implementation , Application Specific Integrated Circuits (ASIC) implementation, the Dynamic Cache Flushing Algorithm but none keeps AES assets of good speed and memory conservation; most especially in embedded systems.