Browsing by Author "Balogun, A.O."
Now showing 1 - 4 of 4
Results Per Page
Sort Options
Item Comparative Analysis of Selected Heterogeneous Classifiers for Software Defects Prediction using Filter-Based Feature Selection Method.(FUOYE Journal of Engineering and Technology., 2018) Akintola, G.A.; Balogun, A.O.; Lafenwa-Balogun, F.; Mojeed, H.A.Classification techniques is a popular approach to predict software defects and it involves categorizing modules, which is represented by a set of metrics or code attributes into fault prone (FP) and non-fault prone (NFP) by means of a classification model. Nevertheless, there is existence of low quality, unreliable, redundant and noisy data which negatively affect the process of observing knowledge and useful pattern. Therefore, researchers need to retrieve relevant data from huge records using feature selection methods. Feature selection is the process of identifying the most relevant attributes and removing the redundant and irrelevant attributes. In this study, the researchers investigated the effect of filter feature selection on classification techniques in software defects prediction. Ten publicly available datasets of NASA and Metric Data Program software repository were used. The topmost discriminatory attributes of the dataset were evaluated using Principal Component Analysis (PCA), CFS and FilterSubsetEval. The datasets were classified by the selected classifiers which were carefully selected based on heterogeneity. Naïve Bayes was selected from Bayes category Classifier, KNN was selected from Instance Based Learner category, J48 Decision Tree from Trees Function classifier and Multilayer perceptron was selected from the neural network classifiers. The experimental results revealed that the application of feature selection to datasets before classification in software defects prediction is better and should be encouraged and Multilayer perceptron with FilterSubsetEval had the best accuracy. It can be concluded that feature selection methods are capable of improving the performance of learning algorithms in software defects prediction.Item Email Data Security using Cryptography(International Journal of Information Processing and Communication (IJIPC), 2016) Bajeh, Amos Orenyi; Ayeni, A.O.; Balogun, A.O.; Mabayoje, M.A.Email has become one of the prominent medium of message transmission between web users. Thus, email security measures need to evolve from time to time in order to mitigate security threats which are also evolving and becoming sophisticated. This paper presents a study that proposed, implemented and evaluated the performance of an email security approach that utilizes the Rivest Shamir Adleman algorithm as an additional layer of security. The approach involves an application that converts messages into cipher text as a separate platform. The cipher text is transmitted as the original message on the email platform. Also, the cryptograph keys are transmitted between communicating users via another media such as mobile phone. The proposed approach is evaluated by measuring the accuracy of the message transmitted between users. It showed an average accuracy of 98% over all the scenarios examined.Item How to upload article into the University of Ilorin Institutional Repository(University of Ilorin Press, 2018) Aina, L.O.; Balogun, A.O.For over a century, there has been a drastic growth in the wireless communication industry, as there is a clear shift from the fixed telephone system to the more flexible but robust wireless mobile communication. In his mission to realize what occurs in his quick and wireless conditions, man has invented better, quicker, less expensive and compelling methods for sharing thoughts and data. He found that encounters or thoughts can be transmitted through writing on farm implement, dividers of caverns, applying gun shots, smoke and bush burning, rather than interpersonal or face-to-face approach alone to deliver messages.Item Hybridization of El-Gamal and Blowfish Algorithm for Data Security(International Journal of Information Processing and Communication (IJIPC), 2017) Bajeh, Amos Orenyi; Olatunde, Y.O.; Akintola, A.G.; Balogun, A.O.; Wasiu, M.O.The internet connects all part of the world together and thus, makes it very easy and fast to communicate from different location. Reports by internet user on security issues such as hacking of E-mail account, SQL injection, unauthorized access to transactional details makes users to migrate from one platform to another. The increasing activities of hackers to overcome the existing security measures have raised the need for more and improving security technique. Therefore, this study demonstrates hybridization of Blowfish and El-Gamal algorithm to improve data security and improve the performance of El-Gamal algorithm. In the hybrid system, Blowfish is used to encrypt message containing private data using a secret key after which the secret key is encrypted by El-Gamal algorithm using public and private key which are mathematically related. The cipher text produced contains the mixture of private data and secret key. A simulation program is develop using java in order to experiment the difference between the hybrid system, blowfish and El-Gamal algorithm. The result shows that the developed hybrid system is more secure and faster compared to El-Gamal algorithm.