Browsing by Author "Akintola, A.G."
Now showing 1 - 4 of 4
Results Per Page
Sort Options
Item Anomaly Detection in Dataset for Improved Model Accuracy Using DBSCAN Clustering Algorithm(IEEE Nigeria Chapter., 2015-03) Ajiboye, A.R.; Akintola, A.G.; Ameen, A.O.The purity of the dataset used for model construction plays important roles in the accuracy and reliability of model building; outliers are often caused by noisy data as a result of mechanical faults, changes in system behaviour, or due to human error. This is why it is essential to pre-process dataset prior to modelling, in order to differentiate between data that appears normal or abnormal within the sample space. One important reason for removing outliers is to prevent contaminating effect on the dataset which can lead to bad consequences and serious disaster if not removed. An effective measure that automatically clusters outliers in the dataset using Density-Based Spatial Clustering of Applications with Noise (DBSCAN) technique is proposed in this paper. Rapidminer, an open source software tool is used to experiment on some sample dataset and based on the characteristics of these data objects, some clusters are formed which filter out outliers from the dataset being explored. The experimental results from this study show that, the DBSCAN algorithm is a suitable technique for outliers detection and capable of filtering the abnormal data from a combination of noise and normal dataset.Item Frequent Pattern and Association Rule Mining from Inventory Database Using Apriori Algorithm(African Journal of Computing & ICT, 2014-09) Adewole, K.S.; Akintola, A.G.; Ajiboye, A.R.Recently, data mining has attracted a great deal of attention in the information industry and in a Society where data continue to grow on a daily basis. The availability of huge amounts of data and the imminent need for turning such data into useful information and knowledge is the major focus of data mining. The information and knowledge obtained from large data can be used for applications ranging from market analysis, fraud detection, production control, customer retention, and science exploration. A record in such data typically consists of the transaction date and the items bought in the transaction. Successful organizations view such databases as important pieces of the marketing infrastructure. This paper considers the problem of mining association rules between items in a large database of sales transactions in order to understand customer-buying habits for the purpose of improving sales. Apriori algorithm was used for generating strong rules from inventory database. It was found that for a transactional database where many transaction items are repeated many times as a superset in that type of database, Apriori is suited for mining frequent itemsets. The algorithm was implemented using PHP, and MySQL database management system was used for storing the inventory data. The algorithm produces frequent itemsets completely and generates the accurate strong rules.Item Hybridization of El-Gamal and Blowfish Algorithm for Data Security(International Journal of Information Processing and Communication (IJIPC), 2017) Bajeh, Amos Orenyi; Olatunde, Y.O.; Akintola, A.G.; Balogun, A.O.; Wasiu, M.O.The internet connects all part of the world together and thus, makes it very easy and fast to communicate from different location. Reports by internet user on security issues such as hacking of E-mail account, SQL injection, unauthorized access to transactional details makes users to migrate from one platform to another. The increasing activities of hackers to overcome the existing security measures have raised the need for more and improving security technique. Therefore, this study demonstrates hybridization of Blowfish and El-Gamal algorithm to improve data security and improve the performance of El-Gamal algorithm. In the hybrid system, Blowfish is used to encrypt message containing private data using a secret key after which the secret key is encrypted by El-Gamal algorithm using public and private key which are mathematically related. The cipher text produced contains the mixture of private data and secret key. A simulation program is develop using java in order to experiment the difference between the hybrid system, blowfish and El-Gamal algorithm. The result shows that the developed hybrid system is more secure and faster compared to El-Gamal algorithm.Item Student Web Self-Service Portal for a Tertiary Institution(Covenant University, Nigeria., 2016) Akintola, A.G.; Adewole, K.S.; Mabayoje, M.A.; Oke, J.O.The optimum condition for students to study is in an environment where they can access virtually all they need to know about courses, lecturers, locate places (for fresh and prospective students), validate staff identity, access past examination questions easily, identify vacant student hostels within and outside the school premises. Some of the reasons for students’ failure can be attributed to finding accommodation within or outside the school premises. Also, fresh students find it difficult to locate specific places in the university environment and some students find it very difficult to interact with staff. This paper presents a student self-service portal to address some of these challenges. Unified Modeling Language (UML) was used to model the system. The model was implemented using Microsoft C#, Microsoft ASP.net, Microsoft SQL Server, and Google Map. The proposed system was tested and the result obtained during the execution shows that the system is capable of addressing some of the challenges confronted by students.