Research Articles in Mathematics and Computer Science
Permanent URI for this collection
Browse
Recent Submissions
Item Mathematical Transmission of SEIR Epidemic Model with Natural Immunity(Asian Journal of Pure and Applied Mathematics, 2021-09) Olopade, Adesola I.; Adesanya, Adelani O.; Akinwumi, Titilayo O.The SEIR mathematical and epidemiological model with natural immunity and treatment rate are explored in this paper. Both local and global stability were analyzed for disease-free equilibrium point. The threshold quantity “Basic Reproduction Number” ( 0 R ) with natural immunity was derived using next generation matrix method (NGM), and it is shown that the disease free equilibrium point is locally and globally asymptotically stable whenever the basic reproduction number is less than unity i.e. ( R0 1), while endemic whenever ( 1 0 R ). Numerical simulations show that, strong natural immunity reduces the dynamical spread of epidemic diseases.Item A Mathematical Model for the Transmission of HIV/AIDS with Early Treatment(Journal of Advances in Mathematics and Computer Science, 2021) Akinwumi, T. O.; Olopade, I. A.; Adesanya, A. O.; Alabi, M. O.In this paper, a mathematical model for the transmission of HIV/AIDS with early treatment is developed and analyzed to gain insight into early treatment of HIV/AIDS and other epidemiological features that cause the progression from HIV to full blown AIDS. We established the basic reproduction number which is the average number of new secondary infection generated by a single infected individual during infectious period. The analysis shows that the disease free equilibrium is locally and globally asymptotically stable whenever the threshold quantity is less than unity i.e. Numerical analysis shows that the early treatment of latently infected individuals reduces the dynamical progression to full blown AIDS. The result also showed that immunity boosted substances increase the red blood cells, sensitivity analysis of basic reproduction number with respect to parameters showed that effective contact rate must not exceed 0.3 to avoid endemic stage.Item A Systematic Literature Review of Mobile Cloud Computing(International Journal of Multimedia and Ubiquitous Engineering, 2015) Eweoya, Ibukun; Olawande, DaramolaMobile cloud computing (MCC) is a relatively new concept that leverages the combination of cloud technology, mobile computing, and wireless networking to enrich the usability experiences of mobile users. Many field of application such as mobile health, mobile learning, mobile commerce and mobile entertainment are now taking advantage of MCC technologies. Since MCC is new, there is need to advance research in MCC in order to deepen practice. Currently, what exist are mostly descriptive literature reviews in the area of MCC. In this paper, a systematic literature review (SLR), which offers a structured, methodical, and rigorous approach to the understanding of the trend of research in MCC, and the least and most researched issue is presented. The objective of the study is to provide a credible intellectual guide for upcoming researchers in MCC to help them identify areas in MCC research where they can make the most impact. The SLR was limited to peer-reviewed conference papers and journal articles published from 2002 to 2014. The study reveals that privacy, security and trust in MCC are the least researched, whereas issues of architecture, context awareness and data management have been averagely researched, while issues on operations, end users, service and applications have received a lot of attention in the literature.Item Networking for Cloud and Data Centre - A Systematic Mapping Study(International Journal of Engineering Research and Technology, 2019) Odun-Ayo, Isaac; Eweoya, Ibukun; Toro-Abasi, Williams; Bogle, SherreneCloud computing is an important network model, which enables communication between the various components of the cloud using different service types and models. Although the issue of identifying a specific area of research that is networking-related for Cloud and data center is usually a concern to a researcher, a review or survey paper assists in easily identifying likely topics of research. Therefore, the aim of this work is to carry out of a systematic mapping study of networking for Cloud and data center. These allows for categorization in a subject area using a scheme based on certain classification process. The scheme used in this paper was categorized into three facets namely: topic, research and contribution facets. The results showed that there were more publications in terms of design on networking for Cloud and data center in the area of metric, model and method with 2.52%, 16.81% and 7.56% respectively. There were more papers on security in networking for Cloud and data center in terms of tool with 5.04%, and more articles on management and scaling in the aspect of process. Also, more articles got published on design in the area of evaluation research, validation research and solution research with 9.92%, 9.16% and 7.63 % respectively. There were more work on philosophical papers in terms of management and scaling with 2.29% and more articles on security in relation to experience papers. This study reveals gaps in networking for Cloud and data center, and it should arouse research interest in the academia and the industry.Item A Systematic Mapping Study of Edge Computing and Internet of Things with the Cloud(International Journal of Engineering Research and Technology, 2019) Odun-Ayo, Isaac; Eweoya, Ibukun; Toro, Williams; Bogleb, SherreneCloud computing is a business paradigm wherein computers and computing related services are provided by Cloud Service Providers to consumers either as software, development platform, or infrastructure. The integration of edge computing and IoT with Cloud opens a new technological dimension and a vista of research opportunities in this field. To determine the research context specifically in edge computing and IoT in relation to the cloud is a rigorous research process, this is where reviews and paper surveys come to play; as they easily help to discover research gaps. This paper aims to conduct a systematic mapping study of integration of Edge and IoT with the Cloud. A combination of topical, research and contribution facets were used to analyze publications of interest in reputable journals, magazines and conferences. Obtained results showed that most publications were on the topic of Applications in terms of Tool and Model, with 11.21% and 17.76% respectively. They were closely followed by publications on Architecture in terms of Model and Tool with 11.21% and 5.61%. Opinion papers were the least in the aspects of Architectures. In addition, there were more publications on Evaluation and Solution research with respect to Application with 9.92% and 14.5% respectively. Most papers on Ubiquitous Networks were in the area of Validation research with 5.34%. Furthermore, there were more work on Optimization in the areas of Philosophical, Evaluation and Experience studies, with 7.62%, 6.11% and 6.11% respectively. The output of this research is to be of benefit to research community as it readily points out areas of research drought.Item Fraud prediction in loan default using support vector machine(IOP Conf. Series: Journal of Physics: Conf. Series, 2019) Eweoya, Ibukun; Adebiyi, A A; Azeta, A A; Amosu, OlufunmilolaThe concept of taking loan has been in existence since inception of the human race but it is now taking diverse dimensions. This spans through personal exchange of loans for repayment based on personal track records, enjoying loans as proceeds of daily contribution without collaterals, except for the banking sector that requests collaterals for official loans. The uniform occurrence of being unable to pay the debts and resulting in a default is evident to the level of bank closures and nations’ bankruptcy is experienced across board. With a large volume and variety of data, credit history judgment by man is inefficient; case-based, analogy-based reasoning and statistical approaches have been employed but the 21st century fraudulent attempts cannot be discovered by these approaches, hence; the machine learning approach using the support vector machine. This work employs a supervised learning approach based on machine learning to predict the possibility of a fraud in a loan application through hidden trends in data instead of giving loans which ordinarily should not be approved; past occurrences discovered through machine learning reveals risky loans and a possible fraud by humans in approvals that can result in a default. Machine learning approaches are able to detect fraudulent financial statements to avert business comatoseItem A Naive Bayes approach to fraud prediction in loan default(IOP Conf. Series: Journal of Physics: Conf. Series, 2019) Eweoya, Ibukun; Adebiyi, A A; Azeta, A A; Chidozie, F; Agono, F O; Guembe, BThe essence of granting loans to individuals and corporate beneficiaries is to boost the economy while the lenders make profit from the interest that accrues to the lending. However, due to non-compliance to basic rules, fraud is prevalent in credit administration and traditional methods of detecting fraud have failed. Furthermore, they are time-consuming and less accurate. This work uses a supervised machine learning approach, specifically the Naïve Bayes to predict fraudulent practices in loan administration based on training and testing of labeled dataset. Previous works either predict credit worthiness or detect loan fraud but not predicting fraud in credit default. The approach employed in this work yielded 78 % accuracy.Item Fraud prediction in bank loan administration using decision tree(IOP Publishing: 3rd International Conference on Science and Sustainable Development (ICSSD 2019), 2019) Eweoya, Ibukun; Adebiyi, A .A .; Azeta, A .A .; Azeta, Angela E.The rate at which banks looses funds to loan beneficiaries due to loan default is alarming. This trend has led to the closure of many banks, potential beneficiaries deprived of access to loan; and many workers losing their jobs in the banks and other sectors. This work uses past loan records based on the employment of machine learning to predict fraud in bank loan administration and subsequently avoid loan default that manual scrutiny by a credit officer would not have discovered. However, such hidden patterns are revealed by machine learning. Statistical and conventional approaches in this direction are restricted in their accuracy capabilities. With a large volume and variety of data, credit history judgement by man is inefficient; case-based, analogy-based reasoning and statistical approaches have been employed but the 21st century fraudulent attempts cannot be discovered by these approaches, hence; the machine learning approach using the decision tree method to predict fraud and it delivers an accuracy of 75.9 percent.Item Energizing the Advanced Encryption Standard (AES) for Better Performance(International Journal of Scientific & Engineering Research., 2016-04) Sari, Arif; Rahnama, Behnam; Eweoya, Ibukun; Agdelen, ZaferSecurity is a never ending challenge. The security researchers must be steps ahead to avoid attacks and threats, thereby keeping businesses running and avoiding calamities. The Advanced Encryption Standard (AES) is to this rescue after its official acceptance and recommendation by National Institute of Standards and Technology (NIST) in 2001. However, timing attacks have called for a modification to it to retain its potency and effectiveness. This research boosts the Rijndael by incorporating an invented playfair ciphering into the algorithm using 256 ASCII codes. The concept counters possible leakages from the S-box lookups from the cache. The research introduces mixcolumn in the last round against the standard to make it a constant time algorithm. The encryption and decryption were validated. Previous researches implemented Architectural and operating system modifications, placing all the lookup tables in CPU registers, Parallel Field Programmable Gate Array (FPGA) implementation , Application Specific Integrated Circuits (ASIC) implementation, the Dynamic Cache Flushing Algorithm but none keeps AES assets of good speed and memory conservation; most especially in embedded systems.Item E-Banking Use Behaviour: E-Service Quality, Attitude, and Customer Satisfaction.(International Journal of Bank Marketing, 2016-05) Ayo, C.K.; Oni, A.A.; Adewoye, O.J.; Eweoya, IbukunAdvances in electronic service technology have created great opportunities as well as threats to organizations including the banking sector. Nigerian banks have invested immensely on electronic services as a measure to meet up with the global standard, reduce transaction cost, provide better services to customers and promote efficiency. While e-banking services are numerous, there is no enough evidence of its acceptance among customers as the volume of cash transaction continues to be on the increase. This study aims at investigating factors affecting e-banking usage based on electronic service (e-service) quality. The survey instrument employed involved administering survey questionnaires to a total of 400 respondents within the Lagos metropolis and its environs. E-services quality integrated with diffusion of innovations (DOI) theory was developed as a conceptual framework for analyzing the factors influencing customer’ satisfaction and usage of e-banking. The model employed reliability, responsiveness, availability, service portfolio and competence as extensions to the constructs of DOI: complexity, compatibility, and relative advantage to better reflect the users’ views. Our result reveals that perceived e-service quality alone had a strong relationship with customer satisfaction and use which means that greater quality of e-service has the potential to increase satisfaction and consequently in more use of e-banking. However, in this research finding, competence of e-service support staff, system availability, service portfolio, responsiveness and reliability, in that order, were found to be most significant in rating e-service quality.Item A SYSTEMATIC MAPPING STUDY OF CLOUD COMPUTING MIDDLEWARE, STACKS, TOOLS, DELIVERY NETWORKS(International Journal of Mechanical Engineering and Technology (IJMET), 2019-05) Odun-Ayo, Isaac; Samuel, Victoria; Eweoya, Ibukun; Oyom, PaulCloud computing is presently playing a significant role in the provisioning of vital services in information technology. A unique aspect of cloud computing is the cloud middleware and other related entities which supports applications and networks. Determining a particular research area especially in terms of cloud middleware and services at all levels could be a cumbersome process for a researcher, hence the need for reviews and paper surveys that identify research gaps. The purpose of this paper was to conduct a systematic mapping study of cloud computing middleware, stacks, tools and services at all layers. The focus was on three facets of studies, the research facet, topic facet and contribution facet. The results showed that there were more publications on tool in the contribution facet with tool, model, method and process having 18.10%, 13.79%, 6.03% and 8.62% respectively. In addition, evaluation and solution research had the largest number of articles in terms of tool with 14.17% and 26.77% respectively. A most striking aspect of the systematic map is that solution research has the highest frequencies of publication in relation to all aspects of the topics extracted for the study. This study clearly identified gaps in the field of cloud computing middleware, which should stimulate interest for further studies by both researchers and industry practitioners.Item Enhancing Educational Learning with Social Network Platform(IEEE, 2015-03) Azeta, Ambrose A.; Eweoya, Ibukun O.; Ojumah, SamuelAbstract—In the world today, education has shown to be a major contributing factor to human and national development. The educational system developed in the last century has moved from traditional system to e-learning on static web and recently to dynamic web. With the advent of social network on the Internet, interaction has been encouraged round the world and the method of connecting everyone in the world is now so easy. Although there are various platforms that exist as social network, few of them integrate learning functionalities as a service. This paper provides a social network platform to enhance educational learning. The social network was designed using Unified modeling Language (UML) and implemented using open source software primarily to connect students and lecturer. The system extends the integration in the classroom further and thus, makes the learning process effective.Item Energizing the Advanced Encryption Standard (AES) for Better Performance(International Journal of Scientific & Engineering Research, 2016-04) Sari, Arif; Rahnama, Behnam; Eweoya, Ibukun; Zafer Agdelen4; Agdelen, ZaferSecurity is a never ending challenge. The security researchers must be steps ahead to avoid attacks and threats, thereby keeping businesses running and avoiding calamities. The Advanced Encryption Standard (AES) is to this rescue after its official acceptance and recommendation by National Institute of Standards and Technology (NIST) in 2001. However, timing attacks have called for a modification to it to retain its potency and effectiveness. This research boosts the Rijndael by incorporating an invented playfair ciphering into the algorithm using 256 ASCII codes. The concept counters possible leakages from the S-box lookups from the cache. The research introduces mixcolumn in the last round against the standard to make it a constant time algorithm. The encryption and decryption were validated. Previous researches implemented Architectural and operating system modifications, placing all the lookup tables in CPU registers, Parallel Field Programmable Gate Array (FPGA) implementation , Application Specific Integrated Circuits (ASIC) implementation, the Dynamic Cache Flushing Algorithm but none keeps AES assets of good speed and memory conservation; most especially in embedded systems.Item E-Banking Use Behaviour: E-Service Quality, Attitude, and Customer Satisfaction.(International Journal of Bank Marketing, 2016-05) Ayo, C.K.,; Oni, A.A.; Adewoye, O.J.; Eweoya, I.O.Advances in electronic service technology have created great opportunities as well as threats to organizations including the banking sector. Nigerian banks have invested immensely on electronic services as a measure to meet up with the global standard, reduce transaction cost, provide better services to customers and promote efficiency. While e-banking services are numerous, there is no enough evidence of its acceptance among customers as the volume of cash transaction continues to be on the increase. This study aims at investigating factors affecting e-banking usage based on electronic service (e-service) quality. The survey instrument employed involved administering survey questionnaires to a total of 400 respondents within the Lagos metropolis and its environs. E-services quality integrated with diffusion of innovations (DOI) theory was developed as a conceptual framework for analyzing the factors influencing customer’ satisfaction and usage of e-banking. The model employed reliability, responsiveness, availability, service portfolio and competence as extensions to the constructs of DOI: complexity, compatibility, and relative advantage to better reflect the users’ views. Our result reveals that perceived e-service quality alone had a strong relationship with customer satisfaction and use which means that greater quality of e-service has the potential to increase satisfaction and consequently in more use of e-banking. However, in this research finding, competence of e-service support staff, system availability, service portfolio, responsiveness and reliability, in that order, were found to be most significant in rating e-service quality.Item Enhancing the Quality of University Education: The Role of Private Universities(Proceedings of the 10th International Conference on Private Higher Education in Africa Organized By St. Mary’s University College in Collaboration with The Association of African Universities (AAU), The African Union Commission (AUC), The Association for the Development of Education in Africa (ADEA), and Covenant University (CU, Nigeria), 2012) Ayo, C.K.,; Eweoya, Ibukun; Ajieh, C.African universities, pre-independence, operated as affiliates of foreign universities and offered quality education. The quality offered was pronounced even post-independence but the military incursion in politics brought about a decline in quality occasioned by poor funding and inadequate infrastructural development. These led to the massive exodus of the university dons to the developed world with better conditions of service, a development that is fondly referred to as “brain drain”. Consequently, most parents, particularly the rich send their children abroad in search of quality education but at the expense of moral upbringing and character development, the overall cost notwithstanding. Private universities came into existence in Nigeria since 1999 and till date, there are about 50 of them while the Public and State universities are 36 each. The Private universities offer a good balance of quality and character modelling and have become the preferred choice for most parents. Therefore, this paper presents the Covenant University model being rated as the most preferred Private University in Nigeria; and renowned for high academic standard and high level of discipline. The innovations in curriculum design, unique and customized programmes as well as the leadership and character development imperatives are also discussed. The parameters for World Class Universities are also presented with the efforts of Covenant University highlighted.Item A SYSTEMATIC MAPPING STUDY OF CLOUD COMPUTING MIDDLEWARE, STACKS, TOOLS, DELIVERY NETWORKS(International Journal of Mechanical Engineering and Technology (IJMET), 2019-05) Odun-Ayo, Isaac; Samuel, Victoria; Eweoya, Ibukun; Oyom, PaulCloud computing is presently playing a significant role in the provisioning of vital services in information technology. A unique aspect of cloud computing is the cloud middleware and other related entities which supports applications and networks. Determining a particular research area especially in terms of cloud middleware and services at all levels could be a cumbersome process for a researcher, hence the need for reviews and paper surveys that identify research gaps. The purpose of this paper was to conduct a systematic mapping study of cloud computing middleware, stacks, tools and services at all layers. The focus was on three facets of studies, the research facet, topic facet and contribution facet. The results showed that there were more publications on tool in the contribution facet with tool, model, method and process having 18.10%, 13.79%, 6.03% and 8.62% respectively. In addition, evaluation and solution research had the largest number of articles in terms of tool with 14.17% and 26.77% respectively. A most striking aspect of the systematic map is that solution research has the highest frequencies of publication in relation to all aspects of the topics extracted for the study. This study clearly identified gaps in the field of cloud computing middleware, which should stimulate interest for further studies by both researchers and industry practitioners.Item Inflation: How Much is Too Much for Economic Growth in Nigeria(Springer: Indian Economic Review, 2006) FABAYO, JOSEPH ADEMOLA; AJILORE, OLUBANJO TAIWOThis study follows the methodology of Khan and Sendhadji (2001) to examine the existence of threshold effects in the inflation-growth relationship, using Nigeria data for the period 1970 to 2003. The results suggest the existence of inflation threshold level of 6 percent. Below this level, there exists significantly positive relationship between inflation and economic growth, while above this threshold level, inflation retards growth performance. Sensitivity analyses conducted confirmed the robustness of these results. This finding suggests that bringing inflation down to single digits should be the goal of macroeconomic management in Nigeria, while the optimal inflation target for policy in NigeriaItem Enhancing Educational Learning with Social Network Platform(2014 IEEE 6th International Conference on Adaptive Science & Technology (ICAST), 2015-03) Azeta, Ambrose A.; Eweoya, Ibukun; Ojumah, SamuelIn the world today, education has shown to be a major contributing factor to human and national development. The educational system developed in the last century has moved from traditional system to e-learning on static web and recently to dynamic web. With the advent of social network on the Internet, interaction has been encouraged round the world and the method of connecting everyone in the world is now so easy. Although there are various platforms that exist as social network, few of them integrate learning functionalities as a service. This paper provides a social network platform to enhance educational learning. The social network was designed using Unified modeling Language (UML) and implemented using open source software primarily to connect students and lecturer. The system extends the integration in the classroom further and thus, makes the learning process effective.Item The Adoption of E-Tourism: An Empirical Investigation(Asian Journal of lnformation Technology, 2016) Eweoya, Ibukun; Okuboyejo, Senanu R.; Agomuo, KelechiMan's desire to discover more, enjoy more and acquire more is an llllquenchable thirst which gives relevance to tourism. The act of food-searching, safety and environmental-friendliness search in animals is naturally consistent; this is applicable to humans too and it boosts tourism which involves Customer Reservation Services (CRS), hospitality, airline reservation, car hire reservation and others. E-tourism is a revolution from traditional way of physically present in multiple locations to plan a tour, to achieving numerous tour planning tasks with maximwn convenience using ICT. This research is a smvey research, it investigates the acceptance and adoption of e-tourism in Nigeria, adopting the UTAUT/UTAUT2 model and analyzed the gathered data from the questionnaires using Smart PLS 3 to confirm the reliability and validity of the measurement instruments.Item Improving Security Using Refined 16 X 16 Playfair Cipher for Enhanced Advanced Encryption Standard (AES)(Covenant Journal of Informatics and Communication Technology (CJICT, 2013-12) Eweoya, Ibukun; Daramola, Olawande; Omoregbe, NicholasThe conventional playfair cipher has lost its potency due to the sophistication of modern systems that can break it by brute force. This work proposes an improved playfair encryption and decryption that will be hard to break by brute force procedure. It uses a 16 X 16 arrays of ASCII characters ensuring relevance in all computing fields instead of the conventional 26 upper case alphabets substitution. An implementation of the cryptographic concept was realized using PHP programming language and embedded in the Advanced Encryption Standard (AES) algorithm. We argue from the perspective of cryptanalysis that our proposed approach is stronger and will be more difficult to break.