Awodele Oludele

Awodele Oludele
Babcock University · Computer Science

Doctor of Philosophy

About

86
Publications
203,960
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
865
Citations
Citations since 2016
23 Research Items
561 Citations
2016201720182019202020212022020406080
2016201720182019202020212022020406080
2016201720182019202020212022020406080
2016201720182019202020212022020406080
Additional affiliations
September 2001 - March 2016
Babcock University
Position
  • Professor

Publications

Publications (86)
Conference Paper
Full-text available
Automating the process of malaria diagnosis is very crucial; malaria is a deadly disease with an annual infection rate between 300-500 million and a death rate of 1 million yearly. The diagnosis approach is manual and is subject to human error. In this current work, we automate the process of diagnosis and provide results in quantitative form with...
Article
Full-text available
Image steganography is an act of concealing secret information using the image as a cover medium. It is said to be reversible when the same level of importance placed on the retrieval of the secret information is also placed on the recovery of the cover image. The process of hiding information in a cover is called steganography while retrieving the...
Article
Full-text available
Thousands of new threats and threat categories continue to emerge every second in cyberspace, even as known threats keep adapting robustly to existing solutions. This has challenged modern approaches and solutions to threat detection and potentially rendered some of these obsolete even before they are able to find applicability. Much contemporary c...
Article
Full-text available
The problem of congestion is not new to the field of telecommunications; its root can be traced back to the very foundations of the internet. Most, if not all networks, are currently faced with this problem. The distribution of resources on the network is very vital. The fact that resources are limited brought about major problem such that these li...
Article
Full-text available
The proliferation of Information Communication Technology has drastically propelled the advance in the study and development of computer science and related scientific researches across the World. It has triggered the use of computer-aided technologies to improve in different spheres of human life significantly by impacting most developed countries...
Article
Full-text available
The issue of cyber-crimes has continually pose a major threat both locally and globally since the growth in the use of computers and the internet. Various measures are continually been used by all bodies concerned to curb this trend that has gained prominence among youths although only minor success has been recorded. Hence, there is need for a mor...
Article
Full-text available
Persuasive technologies for promoting physical fitness, good nutrition and other healthy behaviors have been growing in popularity. Despite their appeal, the design and evaluation of these technologies remains a challenge and usually require a fully functional prototype and long term deployment just like any other information system. Hence, the foc...
Article
Full-text available
Persuasive techniques are recently being explored by computer science researchers as an effective strategy towards creating applications that are aimed at positive attitudinal changes especially in the health domain but finding effective evaluation approaches for these technologies remain an herculean task for all stakeholders involved and in order...
Article
Full-text available
Prediction models are usually built by applying a supervised learning algorithm to historical data. This involves the use of data analytics system that uses real-time integration and dynamic real time responses data to detect churn risks. Subscribe are increasingly terminating their membership agreement with telecommunication companies through mobi...
Article
Full-text available
Botnets have carved a niche in contemporary networking and cybersecurity due to the impact of their operations. The botnet threat continues to evolve and adapt to countermeasures as the security landscape continues to shift. As research efforts continue to seek a deeper and robust understanding of the nature of the threat for more effective solutio...
Article
Full-text available
Chronic Myeloid Leukemia (CML) had been stratified into risk groups using scoring systems but these systems have limitation of overfitting data. Machine Learning (ML) algorithms were used to extract meaningful information from the datasets, but the loss function (empirical risk) of the algorithms was not considered to determine the risk that was in...
Article
Full-text available
The data-driven methods capable of understanding, mimicking and aiding the information processing tasks of Machine Learning (ML) have been applied in an increasing range over the past years in diverse areas at a very high rate, and had achieved great success in predicting and stratifying given data instances of a problem domain. There has been gene...
Conference Paper
The introduction of adhoc networks into wireless communication opened up a new dimension because devices can communicate without any centralized system. The nodes on this type of network are responsible for forwarding and receiving packets and are very mobile. This type of network is easily deployable and self-configuring because it adapts to the r...
Conference Paper
Full-text available
Several factors play major roles in shaping and determining the objective and effect of a game in any system of education. Unfortunately, many business games do not consider socio-cultural and environmental differences as major factors which affect the level of managerial competencies and business acumen. This work briefly discusses the factors tha...
Article
Full-text available
Big data is a key concept that cannot be overlooked in the IT world considering the prominent increase in data, and data related services, it is important to explore this field and look at ways to improve data service delivery especially in the cloud. Cloud computing on the other hand helps in tackling the issue of storage and data service. This re...
Article
Full-text available
The usability of Electronic Health Record systems, while recognized as critical for successful adoption and meaningful use, has not historically received the same level of attention as other software features, functions, and technical requirements. In the Nigerian healthcare sector, it was observed that only few had adopted the use of electronic he...
Article
Full-text available
For some time now, people have speculated on what makes the living different from the non-living; and what the possibility of creating synthetic system from natural system is. From the mid-1980s, artificial life (ALife) has studied living systems using a synthetic approach. This approach builds life in order to understand it better in any of the th...
Article
Full-text available
This paper considers a scenario in which a sender who holds a k-bit to k-bit trapdoor permutation f wants to transmit a message x to a receiver who holds the inverse permutation f⁻¹; with the condition that encryption should require just one computation of f, decryption should require just one computation of f⁻¹, the length of the enciphered text s...
Article
Full-text available
Supermarkets are not completely equipped with systems that reduce congestion, secure customer belongings, prevent card information theft, and reduce error when input-ting product details into the electronic Point of Sales device when demand increases which often leads to loss of sales. The current system used is expensive and requires constant upda...
Article
Full-text available
The present world is technology driven as it is employed by many fields in the performance of their operation. In the case of law enforcement agencies, this is evident in the use of automated crime record management systems (CRMS) worldwide to keep record of crime and criminals involved. Crime being an act against the law of a society is a threat t...
Article
Full-text available
Information is an important part of any system. In the academic world, information is especially very important and essential. Students have to register for courses, take attendance, quizzes, and exams and as well as check their scores. Years after graduating from the school, students come back asking for transcript. It is therefore very important...
Article
Full-text available
With the astronomic growth in the use of smartphones and sophisticated gadgets globally, it is no surprise that the owners of such devices install various software to proper utilize such devices. It is however interesting to find that almost all of the software and games that reside on such devices are of western origin. In recent times, the develo...
Conference Paper
Full-text available
As network continue to grow it is increasingly important that network administrators are aware of the different types of traffic that is traversing their networks as well as provides sufficient means for decision making process. Traffic monitoring and analysis is essential in order to more effectively troubleshoot and resolve issues when they occur...
Conference Paper
Full-text available
Cyber security is generally an extension of the traditional information technology (IT) security that is aimed at protecting systems, applications and data that exposed to a variety of forms of attack via the internet, ranging from data theft and espionage to corruption of data and denial of service attacks. There is a need for an increase in cyber...
Article
Full-text available
Cloud computing, the technology that makes it possible for computing resources to be provisioned to clients / subscribers over long distances, as well as its component technology – virtualization, which makes it possible for multiple guest systems to co-reside on a single host machine and share the computing resources of the host, have both become...
Article
Full-text available
One of the emerging trends that have gained increasing prominence and is fast becoming a household name in the global IT industry is the concept of cognizant computing. Research has repeatedly suggested that this technology may hold the key to satisfying nearly all the computing needs of humanity even down to the preferences of the unique individua...
Article
Full-text available
Construction is the process of building or assembling of infrastructure either for residential, industrial, commercial or heavy civic activities. It is a major factor in the development of different socioeconomic sectors. For the successful execution of a project, effective planning in terms of the project lifespan, the environmental impact of the...
Article
Full-text available
Learning is the act of acquiring knowledge or skill through study. In order to survive in this ever evolving universe, one is expected to acquire various survival skills and thus improve himself to become a better individual. There is the need for every child to be educated. It has been realized that learning can be more fun and of greater value ou...
Article
Full-text available
Research in medicine has shown that comorbidity is prevalent among chronic diseases. In ophthalmology, it is used to refer to the overlap of two or more ophthalmic disorders. The comorbidity of cataract and glaucoma has continued to gain increasing prominence in ophthalmology within the past few decades and poses a major concern to practitioners. T...
Article
Full-text available
Strong indications have emerged the world over that a large proportion of people in developing countries are now at great risk of developing cardiovascular (heart) diseases which currently accounts for one-third of all deaths worldwide. The need for an accurate, yet affordable ECG (Electrocardiogram) machine is necessary to ensure the quality of ca...
Article
Full-text available
Blended learning has come off, more or less, as the most logical and natural evolution of our learning systems. It suggests an elegant solution to the challenges of tailoring e-learning environment to face-to-face learning environment. It represents an opportunity to integrate the innovative and technological advances offered by online learning wit...
Data
Full-text available
Information Technology (IT) in effect is and will remain a major player in the Sustainable Education Movement (SEM). This is not to say that IT is the 'cure-all' for the tarrying problems facing the educational system especially in Nigeria. Instead it is a tool if fully adopted for curricular and co‐curricular design will emboss a four-dimensional...
Article
Full-text available
Information and Communication Technology (ICT) is one of the main forces driving the present day business environment. ICT is dramatically informing business practices as well as the outcome of business engagements. There are many factors to consider in the successful adoption of ICT in SMES in developing countries. The development of the ICT solut...
Article
Full-text available
Over the years, several means of electrical power generation have been in place ranging from wood, coal, to fuel. All these means have at its point served purpose at the needed time. This work presents the historical research of solar power in space, an insight into some literature pertaining to Solar Power Satellite (SPS) and Wireless Power Transm...
Article
Full-text available
Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. Cloud users are expected to increase exponentially in the future. In order to prepare for this stipulated increase, analyses of various fac...
Conference Paper
Full-text available
Research has shown that social engineering attack is a form of attack that leverages on human mind or emotional desires in order to fortify their attacking strategy. Over the years, industries/organizations have devised several means of thwarting the technological based attacks but this form of partially non-technological base attack has been a cha...
Article
Full-text available
In recent times, computer chip manufacturers are frantically racing to make the next microprocessor that will overthrow speed records. So Microprocessors made of silicon will eventually reach their limits of speed and miniaturization and their manufacturers will need a new material to produce faster computing speeds. But fortunately scientists have...
Article
Information retrieval (IR) is the field of computer science that deals with the processing of documents containing free text, so that they can be rapidly retrieved based on keywords specified in a user's query. IR was born in the 1950s out of necessity to find useful information from large collections. Over the last sixty years, the field has matur...
Article
Full-text available
Differing characteristics of local environments, both infrastructural and socio-economic, have created a significant level of variation in the acceptance and growth of e-commerce in different regions of the world. The sharp increase of internet usage, as well as the systematic progress of Information Technology has transformed the way goods and ser...
Article
Full-text available
4G is a brand name for the Fourth Generation of the cellular wireless standards. Over the years, Nigerian telecommunication firms have been in operation with predecessor generation standards (such as 2G and 3G). The design principle of each of these cellular wireless standards follow the same principle, where the information to be transmitted will...
Article
Full-text available
Increased failure to access and engage communications channels, increased dropped calls and general poor quality of service are some of the persistent problems encountered in cellular networks. The effect of these on the level of customer satisfaction and consequently on the generated revenue have necessitated the research into developing technique...
Article
Full-text available
Computer networks have arguably become ubiquitous (having grown exponentially over the last 15 years) and synonymous with organisations that thrive on excellence. Hardly will anyone setting up a firm today, do so without thinking of the modalities of incorporating an efficient computer network infrastructure that connects the business to the outsid...
Article
Full-text available
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexib...
Article
Tuberculosis (TB) is an infectious disease which was declared a .global health emergency. by theWorld Health Organisation. The Federal Ministry of Health in Nigeria also declared TB a national emergency and inaugurated the National TB-HIV Working Group in 2006. Every year, 8-10 million people contact the disease and 2 million die from it.Although t...
Article
Pregnant women and their unborn fetuses are at a high risk of deleterious attacks of malaria infection. Also, standard chemotherapy and prophylaxis are lacking or inadequate in most endemic areas. The main objective of this study was to estimate the number of febrile, pregnant women who had malaria infection, and also to determine the influence of...
Article
Full-text available
E-learning has been an important policy for education planners for many years in developed countries. This policy has been adopted by education in some developing countries; it is therefore expedient to study its emergence in the Nigerian education system. The birth of contemporary technology shows that there is higher requirement for education eve...
Article
This study was carried out among the students of three secondary schools in Ibadan North Local Government Area of Oyo State, Nigeria, using the Ajibode stream situated along Ajibode village as the project area. A total of 205 students were examined, for the presence of Schistosoma (S.) haematobium ova from the three secondary schools. Sixty student...