Browsing by Author "Mabayoje, M.A."
Now showing 1 - 11 of 11
Results Per Page
Sort Options
Item An Algorithm of Ontological Model for Indexing and Accessing Research Knowledge(Computer Science Dept., LAUTECH. Ogbomosho,Oyo-State, 2009) Mabayoje, M.A.; Olabiyisi, S. O.ProceedingsItem An Assessment of ICT Literacy among Secondary School Students in a rural area of Kwara State, Nigeria: A Community Advocacy Approach.(Covenant University, Nigeria., 2015) Mabayoje, M.A.; Isah, A.; Bajeh, A. O.; Oyekunle, R. AIn recent times, public schools in Nigeria have enjoyed some benefits in terms of deployment of Information and Communication Technologies (ICTs), but no constant attention and continuous interest is paid to fill the digital gap between schools in the rural and urban areas. The contribution of private sectors in the education system has elevated the use of ICT in both private and public schools especially in the urban areas of Nigeria. However, schools in rural areas have not benefitted much in this area. This research used community advocacy program referred to as COBES (Community Based Experience Scheme) to assess ICT literacy of secondary school students in a rural area of Kwara State, Nigeria. The study employed mixed research approach that combined both quantitative and qualitative data collection strategies. The initial findings of the study revealed low level of ICT skills among secondary school students in the rural area. Although, majority of the students who served as the respondents claimed they have computer teacher and can operate computer systems, yet, the study showed that there is dearth of ICT facilities for hands-on training. Nevertheless, through the one week long COBES program, the findings from three focus group discussion conducted at the end of the COBES program showed that students‟ interest to use ICT increased and majority of them expressed their willingness to continue interacting with computer and internet facilities. Findings further revealed that the main reason for low ICT skills is the lack of ICT facilities for teaching and learning. The study recommended that ICT project implementation should be uniform in all public schools in Nigeria, irrespective of whether it is located in the urban or rural area, adequate and skilled computer studies teachers should be made available and government should put in place mechanisms that will ensure proper maintenance of the ICT facilities.Item Comparative Analysis of Predictive Models Created Based on Some Multi-layered Neural Networks Models(Dept. of Computer Science, LAUTECH Ogbomoso, 2018) Ajiboye, A.R.; Mabayoje, M.A.; Adewole, K.S.Multilayer back-propagation neural networks are the network structures build with distinct layers. Due to some inherent challenges of single-layered network in solving some nonlinear problems, it is desirable to have hidden layer(s) with adequate number of neurons; as this would give more processing power to the network. The main objective of this study was to unveil the architecture that can produce most accurate predictive model among the multilayer back-propagation neural networks that is being considered. This study specifically measures and compares the accuracies of the models created using the feed-forward back-propagation, cascade-forward back-propagation and Elman back-propagation neural networks. The required data sets for implementation were retrieved from the online public repositories. Experiments were conducted and repeated using two sets of different data in order to establish the consistencies of the network outputs. Findings from this study are based on a number metrics, and the results show that, among the three architectures being considered, the predictive model created using the feed-forward neural network architecture records the lowest error and found to converge at the lowest epoch.Item Conficker: An enviable threat to a Computer and internet system.(Fafakawa Centre, University of Cape Coast, Ghana., 2011) Adebayo, O.S.; Amit, Mishra; Mabayoje, M.A.; Abikoye, O. C.; Olagunju, MThe fear of computer worms and virus have became the beginning of wisdom for most computer users just as they both pose threats to the computer and its all activities, organs and usefulness of the computer system. Most of the computer and internet users cannot also differentiate between computer virus and worms and therefore risk a high damage to their system by performing various kinds of activities that are harmful to their system. The categories, damages, symptoms, preventions of a Conflicker worm among others is discussed in this paperItem Control Derivative to Optimal Analysis(Nigerian Association of Mathematical Physics, 2009) Omolehin, J.O.,; Rauf, K.,; Ajisope, M.O.,; Mabayoje, M.A.; Asaju, L.BOptimal control theory, generally, is to determine the control signals which will cause a process to satisfy the physical constraints and at the same time optimize some performance criterion. In this work, a numerical method for finding solution to linear optimal control problems with bounded constraints is examined. This method applied is based on Legendre series of parameterization of both the state and the control variables involving a derivativeItem Email Data Security using Cryptography(International Journal of Information Processing and Communication (IJIPC), 2016) Bajeh, Amos Orenyi; Ayeni, A.O.; Balogun, A.O.; Mabayoje, M.A.Email has become one of the prominent medium of message transmission between web users. Thus, email security measures need to evolve from time to time in order to mitigate security threats which are also evolving and becoming sophisticated. This paper presents a study that proposed, implemented and evaluated the performance of an email security approach that utilizes the Rivest Shamir Adleman algorithm as an additional layer of security. The approach involves an application that converts messages into cipher text as a separate platform. The cipher text is transmitted as the original message on the email platform. Also, the cryptograph keys are transmitted between communicating users via another media such as mobile phone. The proposed approach is evaluated by measuring the accuracy of the message transmitted between users. It showed an average accuracy of 98% over all the scenarios examined.Item Performance Evaluation Of Manhattan And Euclidean Distance Measures For Clustering Based Automatic Text Summarization.(FUOYE Journal of Engineering and Technology, 2019) Salihu, S.A.; Onyekwere, I.P.,; Mabayoje, M.A.; Mojeed, H.A.In the past few years, there has been an explosion in the amount of text data from a variety of sources. This volume of text is a valuable source of information and knowledge which needs to be effectively summarized to be useful. In this paper, automatic text summarization with K-means clustering techniques is presented by employing two different distance measurement methods (Euclidean and Manhattan). The dataset extracted from African prose was preprocessed using stopwords removal and tokenization. The preprocessed document is converted into vector representation using tf-idf technique and k-means clustering is applied using Euclidean and Manhattan distance measures to generate summary. There are different distance measures for k-means which has been used in several works. However, there is dearth of work on performance evaluation of these distance measures in text summarization. The experimental analysis was performed on Waikato Environment for Knowledge Analysis. The results obtained showed that the Euclidean variation produced an extractive summary of sentences amounting to 72% from three different clusters while the Manhattan variation produced an extractive summary of sentences that made up 94% of the total document all in one cluster using compression ratio as the performance metric.Item Predicting Nigeria Budget Allocation using Regression Analysis: a Data Mining Approach(International Journal of the Nigeria Computer Society, 2014) Adewole, K.; Mabayoje, M.A.; Abdulsalam; Ajao, J.Budget is used by the government as a guiding tool for planning and management of its resources to aid in effective decision making. Data mining is one of the most vital areas of research with the objective of finding meaningful information from large datasets. The delay in the preparation of budget of the federation by the Government has become an incessant issue in the running of affairs in the country. This is evident in the delay in the implementation of the previous budget in the country; hence, the need for automated system to tackle the setback. In this paper, regression analysis which is one of the data mining techniques is employed to predict budget allocation summary for the year 2008, 2009, 2010, 2011 and 2012 across40 data points containing ministries, departments, commissions, and Agencies (MDCAs) were used. A web-based data mining tool that employ linear regression to predict both Nigeria budget allocation across the 40 data points and the overall budget summary allocation of the Federation is proposed. The proposed data mining software predicted N1,803,196,024,657.40, N1,871,754,338,112.68 and N2,007,780,403,902.98 for the year 2013, 2014 and 2015 respectively. This tool is found capable of discovering interesting pattern in the data and for predicting budget allocationItem Simulation of Dynamic System Using Visualization Techniques with Emphasis on Water Cooling Process(Mathematical Association of Nigeria., 2010) Olagunju, Mukaila; Taiwo, A.O; Ameen, A.O.; Mabayoje, M.A.The paper focuses on the development of stimulation in order to test the performance of the modeling that is developed which is based on Newton Law of cooling. The MATLAB program was used to develop the stimulation of Dynamic system in two visualization techniques were compared. With the stimulation that was developed, the rate at which cooling of water was taken place were easily determined. The shape of the Dynamic system was measured with the visualization techniques.Item Social Media Preference by Secondary Schools’ Computer Science Teachers(the Faculty of Physical Sciences, University of Ilorin, Ilorin., 2015) Mabayoje, M.A.; Ajia, Ismaeel S.; Tella, A.; Abikoye, O.C.; Akintola, A.GAbstract This research explores the preference for social media by secondary schools teacher for the teaching of computer science in Ilorin metropolis. Questionnaires were administered to two hundred (200) respondents randomly selected from ten different secondary schools in Ilorin metropolis. A total of 174 questionnaires were returned completely filled which serve as the overall sample which gives 87% return rate. Findings from the study reveals that commonly used social media are Facebook, Twitter, Skype, Whatsapp, Blackberry Messenger, 2go, Eskimi and LinkedIn. There is a low usage of these services in most of the public and private schools due to the financial implication of procurement and installation of these facilities. Interestingly, level of awareness and acceptability based on the numerous benefits of social media on teaching and learning functions and productivity was of a high proportion. It was concluded that school administrators and parents should collaborate with educational agencies to aid in the effective implementation and funding for the procurement of sophisticated ICTs for better dissemination of social media in both public and private schools in Ilorin metropolis.Item Student Web Self-Service Portal for a Tertiary Institution(Covenant University, Nigeria., 2016) Akintola, A.G.; Adewole, K.S.; Mabayoje, M.A.; Oke, J.O.The optimum condition for students to study is in an environment where they can access virtually all they need to know about courses, lecturers, locate places (for fresh and prospective students), validate staff identity, access past examination questions easily, identify vacant student hostels within and outside the school premises. Some of the reasons for students’ failure can be attributed to finding accommodation within or outside the school premises. Also, fresh students find it difficult to locate specific places in the university environment and some students find it very difficult to interact with staff. This paper presents a student self-service portal to address some of these challenges. Unified Modeling Language (UML) was used to model the system. The model was implemented using Microsoft C#, Microsoft ASP.net, Microsoft SQL Server, and Google Map. The proposed system was tested and the result obtained during the execution shows that the system is capable of addressing some of the challenges confronted by students.