• Home
  • Ademola O. Adesina
Ademola O. Adesina

Ademola O. Adesina
Olabisi Onabanjo University, Ago Iwoye Nigeria

PhD
Information Systems, E-health Systems, ICT Applications, Computer Security, Machine Learning

About

44
Publications
5,709
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
202
Citations
Introduction
Mobile Computing, Information System, Machine Learning

Publications

Publications (44)
Chapter
Full-text available
This study investigated the emerging trend in cyber dynamics among youths using statistical tools. The study adopted a descriptive survey design. The population of the study comprised all cybercriminals in police custody in Ibadan, Nigeria. A simple random sampling procedure was used to select four hundred and eighteen participants for the study. T...
Chapter
Full-text available
Software defined networking (SDN) is an approach to network management that enables the network architecture to be centrally and intelligently controlled with the use of software applications. It is an innovative way in which networks are built by separating the control plane of network devices and data plan and thereby making their management easi...
Preprint
Full-text available
Cloud computing is a model which allows suitable, on-demand network systems connected to a joint pool of organized computing properties such as network systems, computer servers, data storage, software applications, and computer services. The assessment of cloud computing as a superior method of IT outsourcing is extremely useful to the Nigerian IT...
Conference Paper
Full-text available
This study explores the role of Information and Communication Technology (ICT) in promoting and opening up career prospects for the Nigerian youth. In many countries, youth empowerment aims to give young people the skills necessary for self-employment and nation-building. The unemployment and underemployment rates among Nigerian graduates and young...
Conference Paper
Full-text available
This study explores the role of Information and Communication Technology (ICT) in promoting and opening up career prospects for the Nigerian youth. In many countries, youth empowerment aims to give young people the skills necessary for self-employment and nation-building. The unemployment and underemployment rates among Nigerian graduates and young...
Conference Paper
Full-text available
Cloud computing is a model which allows suitable, on-demand network systems connected to a joint pool of organized computing properties such as network systems, computer servers, data storage, software applications, and computer services. The assessment of cloud computing as a superior method of IT outsourcing is extremely useful to the Nigerian IT...
Conference Paper
Full-text available
he difficulty experienced between the patients and other health practitioners during the T Corona Virus (COVID) Pandemic in the area of consultancy, hospital visitation, appointment booking and medical information exchange cannot be estimated. This impediment brought confusion to the aim of achieving the millennium developmental goal on health prov...
Article
Full-text available
Education systems of developing countries are improving with the help of information and communication technology ICT. Recent example is blended learning that is becoming popular in higher institution because of COVID-19. Meanwhile, truancy is becoming a lingering problem in post-primary school in Nigeria contributing to decline in academic perform...
Chapter
Internet of Things technology (IoT) is a fast-growing area of computing, and it is applicable to almost all human endeavor. The introduction of IoT into medicine brought about the Internet of Medical Things (IoMT) that has really redefined the smart healthcare systems globally, though its apprehension to security threats and risk especially in the...
Article
Full-text available
This paper investigated the impact of various keystroke dynamics features on a predictive biometric system. In this paper, keystroke dynamics data of 50 individuals have been acquired using an open-source data software application on an Android smartphone. A total number of 21 commonly used keystroke dynamics features were extracted from the raw da...
Article
Full-text available
This paper investigated the impact of various keystroke dynamics features on a predictive biometric system. In this paper, keystroke dynamics data of 50 individuals have been acquired using an open-source data software application on an Android smartphone. A total number of 21 commonly used keystroke dynamics features were extracted from the raw da...
Article
Full-text available
Keystroke dynamics is a biometric that has been explored as a means of making user authentication more secure. However, studies have indicated that the performance of such a system might be influenced by the demography of the user population. The purpose of this study is to investigate the relationship between the age and gender of the users of a k...
Conference Paper
Full-text available
The banking industry has been rapidly developing the use of internet banking as an efficient and viable tool for service delivery and customer satisfactions to create customer value. It is one of the popular services offered by the traditional banks to provide speedier and reliable services to online users. With the rapid development of computer te...
Article
Full-text available
Machine learning is an integral part of artificial intelligence which allows algorithms to access and learn from previous data for accurate decision making majorly in prediction and classification with little or no human intervention. It is popular in predicting and forecasting by learning from the hidden knowledge in the dataset. However, the accu...
Article
Full-text available
Referral techniques are normally employed in internet business applications. Existing frameworks prescribe things to a particular client according to client inclinations and former high evaluations. Quite a number of methods, such as cooperative filtering and content-based methodologies, dominate the architectural design of referral frameworks. Man...
Article
The adoption of Computer Based Testing (CBT) by Nigerian Tertiary Education Institutions has helped to address some of the challenges relating to the conduct of examinations and results processing. The most prominent of these challenges is the impersonation and to tackle these eventualities, multi-layered security architecture is implemented to ens...
Article
Full-text available
Creating a useful portable browser or program is a demanding challenge for organisations due to the size constraints of the display area, which additionally is contingent on usability, internet connectivity, efficient backup power and mobility. Users also expect performance equivalent to that of microcomputers. Portable display programmers need to...
Article
Full-text available
This study explores the association between and successful enterprise. The online study utilized included past writing and a contextual investigation that include large companies in the West African sub-locale from the Kapital 500 and Forbes Global 2000 records. 135 respondents finished the study and 107 of those deploy arrangements. A model with f...
Article
Full-text available
Development of information and communication technology (ICT) has made it possible to use electronic medical records (EMR) for more than record keeping but also to enable the storage, collection, sharing, and management of EMR among healthcare personnel and other related healthcare institutions. The rapid development of Internet-based computing all...
Article
Full-text available
This paper investigates the different potential uses of EDM and related techniques that can be utilized to address the issues of these uses. The emphasis is on the end goals of these uses while seeking to assemble the uses in classifications with comparative drives and ensure that the proposed taxonomy covered all the contemporary research results....
Article
Full-text available
Data security is becoming more important as data driven activities rose to cloud computing and big data. This concept been addressed using various computing devices and methods including encryption algorithms. Despite the benefit of various encryption methods, limited computing resources and time have hindered the deployment of data security throug...
Article
Full-text available
The use of electronic medical record (EMR) system is gaining attention in the healthcare sectors around the world, and its acceptability threatened by the security of patients' information. Hence, the need to carry out study on efficient way(s) of protecting the information on EMR so that when even accessed it will remain incomprehensible except th...
Article
Full-text available
Mobile communication emergence has brought a whole palette of new possibilities in information sharing not only for individual development but also for national growth. New mobile information devices such as Personal Digital Assistants, Smart-phones, i-phones and the like put forward several advantages for personal assistance to the mobile users. T...
Article
Full-text available
Mobile phones have been identified as one of the technologies that can be used to overcome the challenges of information dissemination regarding serious diseases. Short message services, a much used function of cell phones, for example, can be turned into a major tool for accessing databases. This paper focuses on the design and development of a sh...
Article
Full-text available
The concept of scalability for the survival and full-scale implementation as well as efficient utilisation of any distributed system, particularly grid computing, cannot be over-emphasised. It is through this security concept that inter-domain and intra-domain resource sharing, distribution and aggregation can be adequately ensured and guaranteed....
Article
Full-text available
There is a growing interest in the use of context-awareness as a technique for developing pervasive computing applications that are flexible and adaptable for users. In this context, however, information retrieval (IR) is often defined in terms of location and delivery of documents to a user to satisfy their information need. In most cases, morphol...
Article
Full-text available
Mobile phones are ubiquitous with millions of users acquiring them every day for personal, business and social usage or communication. Its enormous pervasiveness has created a great advantage for its use as a technological tool applicable to overcome the challenges of information dissemination regarding burning issues, advertisement, and health rel...
Article
Full-text available
The rapid advancement in Information and Communication Technology (ICT) has undoubtedly influenced positive changes in carrying out administrative functions in government institutions. The ICT adoption rate in Africa is not impressive when compared to the more developed countries of the world. Nigeria, as a case study in this scenario, has also not...
Article
Full-text available
Wireless sensor networks (WSNs) have become an interesting area to researchers in recent times due to the low cost of sensor nodes, wide application areas and with low or no cost of maintenance after deployment in a target area. Sensor nodes are expected to remain in operation for a longer time without human intervention. However, due to the small...
Article
Full-text available
People use search engines to find information they desire with the aim that their information needs will be met. Information retrieval (IR) is a field that is concerned primarily with the searching and retrieving of information in the documents and also searching the search engine, online databases, and Internet. Genetic algorithms (GAs) are robust...
Article
Full-text available
Grid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). Since this technology allows aggregation of various computer systems for usage by different users to run applications, the information stored on it which may be sensitive and private, remai...
Article
The sensitivity of health-care information and its accessibility via the Internet and mobile technology systems is a cause for concern in these modern times. The privacy, integrity and confidentiality of a patient's data are key factors to be considered in the transmission of medical information for use by authorised health-care personnel. Mobile c...
Article
Full-text available
Mobile technology has contributed to the evolution of several media of communication such as chats, emails and short message service (SMS) text. This has significantly influenced the traditional standard way of expressing views from letter writing to a high-tech form of expression known as texting language. In this paper we investigated building a...
Article
Full-text available
Currently, both Peer-to-Peer Computing (P2P) and Grid Computing have remained the most vibrant and useful forms of distributed computing all over the world. Their applications are such that they cut across both academia and industry. It has come to the notice of researchers that there are great misunderstanding and misinterpretation on what these f...
Article
Full-text available
Transceivers are the major energy consumption in a Wireless Sensor Network which is made of low-power, small in size, low cost and multi-functional nodes. These sensor nodes are operated by batteries which put significant constraint to the energy available to them. Each sensor node collects sensed data and forwards it to a single processing centre...
Article
Full-text available
This study presented DROPT; an acronym for Document ranking Optmization algorithm approach, a new idea for the effectiveness of meaningful retrieval results from the information source. Proposed method extracted the frequency of query keyword terms that appears within the user context of Frequently Asked Questions (FAQ) systems on HIV/AIDS content...
Article
Full-text available
Recent technological advances in wireless communications and wireless sensor networks have enabled the design of low-cost, intelligent, tiny, and lightweight medical sensor nodes that can be strategically placed on human body, create a wireless body area network (WBAN) to monitor various physiological vital signs for a long period of time and provi...
Article
Full-text available
One of the major constraints of wireless sensor networks is limited energy available to sensor nodes because of the small size of the batteries they use as source of power. Clustering is one of the routing techniques that have been using to minimize sensor nodes’ energy consumption during operation. In this paper, A Novel Clustering Algorithm for E...
Conference Paper
Digital watermarking is the art of embedding data, called a watermark, into a multimedia object such that the watermark can be detected or extracted later without impairing the object. Concealment of secret messages inside a natural language, known as steganography, has been in existence as early as the 16<sup>th</sup> century. However, the increas...
Article
Full-text available
The significant roles play by ranking function in the performance and success of Information Retrieval (IR) systems and search engines cannot be underestimated. Diverse ranking functions are available in IR literature. However, empirical studies show that ranking functions do not perform constantly well across different contexts (queries, collectio...
Article
Full-text available
HIV/AIDS continues to be a menace to the global community, especially in sub-Saharan Africa and South Africa is not an exception. The infection rate is continues to grow, in particular, among the young adults. Cell phones have been identified as one of the tools that can be used to overcome the challenge of information dissemination regarding HIV/A...

Network

Cited By

Projects

Projects (3)
Project
This particular project aims to identify the lapses in health and health care(especially in Developing Countries) and develop software applications(creating/developing database, mobile/desktop applications, software solutions) for improving health conditions.
Project
TO STUDY EFFICIENCY OF SOME ENCRYPTION ALGORITHMS AND COME WITH THE MOST SUITABLE FOR ELECTRONIC MEDICAL RECORDS