Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Mabayoje, M.A"

Now showing 1 - 4 of 4
Results Per Page
Sort Options
  • Item
    Application of Information Technology and Its Challenges.
    (Mathematical Association of Nigeria., 2010) Amit, Mishra,; Adebayo, O.S.,; Abdullahi, S.Y.; Mabayoje, M.A
    This paper is aim at examining the concept of information Technology (IT), the new opportunities it offers across the globe and how developing countries such as Nigeria can take advantage of this revolution in Information Technology. This paper will also highlight constrains that have limited the prospect of its usage in developing countries especially Nigeria and offer suitable options where necessary, with a view of empowering Nigerian to develop necessary IT skills for the twenty first century and beyond
  • Item
    Comparative Analysis of Selected Supervised Classification Algorithms.
    (African Journal of Computing & ICT, 2015) Mabayoje, M.A; Balogun, A.O; Salihu, S.; Oladipupo, K.R
    Information is not packaged in a standard easy-to-retrieve format. It is an underlying and usually subtle and misleading concept buried in massive amounts of raw data. From the beginning of time it has been man’s common goal to make his life easier. The prevailing notion in society is that wealth brings comfort and luxury, so it is not surprising that there has been so much work done on ways to sort large volume of data. Over the year, there are various data mining techniques and used to sort large volume of data. This paper considers Classification which is a supervised learning technique. Therefore the need to come up with the most efficient way to deal with voluminous data with very little time frame has been one of the biggest challenges to the AI community. Hence, this paper presents a comparative analysis of three classification algorithms namely; Decision Tree (J-48), Random Forest and Naïve Bayes. A 10-fold cross validation technique is used for the performance evaluation of the classifiers on KDD’’99, VOTE and CREDIT datasets using WEKA (Waikato Environment for Knowledge Analysis) tool. The experiment shows that the type of dataset determines which classifier is suitable.
  • Item
    Conficker: An enviable threat to a computer and internet system
    (Fafakawa Centre, University of Cape Coast, Ghana., 2011) Adebayo, O.S; Mabayoje, M.A; Abikoye, Oluwakemi Christiana; Amit, Mishra; Olagunju, Mukaila
    The fear of computer worms and virus have become the beginning of wisdom for most computer users just as they both pose threats to the computer and its all activities, organs and usefulness of computer systems. Most of the computer and internet users cannot also differentiate between Computer Virus and Worms and therefore risk a high damage to their system by performing various kinds of activities that are harmful to their system. The categories, damages, symptoms, preventions of a conficker worm among others are discussed in this paper.
  • Item
    Enhanced Data Storage Security in Cloud Based on Blowfish Algorithm And Text Steganography
    (NCS., 2018) Mabayoje, M.A; Ajao, J.F; Usman-Hamza, F.E; Saheed, Y.K; Adeniran, K.A.
    Cloud Computing (CC) offers a lot of services that are widely used in Information Technology. These services include sharing of data, information applications and infrastructure, cost reduction, increased storage and flexibility. Despites these services and benefits that CC provides to its user. However, unreliable security, data redundancy and disaster recovery are some of cloud computing challenges. With the existence and introduction of several data security technique, intruders or hackers do not relent in their efforts in developing means of accessing private and important data in the cloud. There are different approaches for securing data in the cloud such as cryptography, steganography, and digital watermarking and so on. This paper presents the combination of Blowfish algorithm (symmetric cryptography) and font properties text steganography to improve the security of data stored in the cloud. Blowfish as a fast and secure symmetric cryptography algorithm was used to change the readable secret data known as plaintext into unreadable format known as cipher text, and then text steganography was applied to the cipher text to change the visibility of the cipher text. The experimental results obtained showed that the proposed system provides reliable security for documents that are store in the cloud.

University of Ilorin Library © 2024, All Right Reserved

  • Cookie settings
  • Send Feedback
  • with ❤ from dspace.ng