Babatunde Akande

Babatunde Akande
Verified
Babatunde verified their affiliation via an institutional email.
Verified
Babatunde verified their affiliation via an institutional email.
  • Bachelor of Science
  • Marketing Specialist at Obafemi Awolowo University

About

42
Publications
1,750
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
28
Citations
Introduction
Welcome to my profile! I'm glad to be a distinguish mathematician
Skills and Expertise
Current institution
Obafemi Awolowo University
Current position
  • Marketing Specialist

Publications

Publications (42)
Article
Full-text available
The global shift toward quantum computing presents both unprecedented opportunities and severe challenges to cybersecurity. In particular, the security of supply chains-a critical component of modern commerce and industrial activity-is increasingly vulnerable to quantum-enabled threats. This research article explores the intricate landscape of quan...
Article
Full-text available
Quantum computing is rapidly emerging as a disruptive force with far-reaching implications across various domains, particularly cybersecurity. This paper investigates the intersection of quantum computing and critical infrastructure cybersecurity, highlighting the risks and opportunities associated with quantum advancements. Utilizing a comprehensi...
Article
Full-text available
Generative AI agents represent a frontier in artificial intelligence, combining generative modeling capabilities with autonomous behavior and the ability to collaborate with humans and other agents. These systems are powered by innovative architectural designs that enable them to perceive, plan, act, and adapt within dynamic environments. This arti...
Article
Full-text available
SQL Injection (SQLi) persists as a major threat to .NET applications since attackers can inject harmful SQL code into databases for database manipulation purposes. The presence of this vulnerability leads to hackers gaining access to unauthorized data and causing system integrity failure while resulting in lost data which threatens organizations ut...
Article
Full-text available
Refugee and asylum-seeking women often experience compounded vulnerabilities due to their displacement status and gender-based inequalities, necessitating targeted interventions that are both trauma-informed and gender-sensitive. This article explores the importance of incorporating gender-sensitive approaches into resilience-building frameworks to...
Article
Full-text available
Data management relies fundamentally on regulatory standard compliance while dealing with decisions that are data-driven. Real-time compliance requirements remain difficult to achieve through Extract Transform Load (ETL) processes which serve data integration functions at scale especially in big systems. The examination through this review examines...
Article
Full-text available
When organizations start implementing microservices and the concept of continuous delivery pipeline, especially while using DevOps, deploying becomes a crucial task in which safety is a significant concern. Canary releases have become a profound practice for rolling out new application updates to a limited number of users in an organization to avoi...
Article
Full-text available
Modern regulatory requirements demand organisations maintain complete transparency and precise trackability of data pipelines, which mainly apply to Extract Transform Load (ETL) operations. Data provenance management and lineage need proper control to produce reliable regulatory reports that withstand inspections from GDPR and BCBS 239 and HIPAA an...
Article
Full-text available
The rapid evolution of cyber threats has underscored the necessity for advanced cybersecurity mechanisms to safeguard sensitive data and digital infrastructures. Intrusion Detection Systems (IDS) have been critical in identifying malicious activities in real-time, but their effectiveness is often hindered by scalability and reliability issues. The...
Article
Full-text available
The advent of quantum computing presents both unprecedented opportunities and significant threats to current cybersecurity infrastructures. As quantum technologies advance, the potential to undermine traditional cryptographic systems becomes a pressing concern for nations and organizations worldwide. This article provides a comprehensive analysis o...
Article
Full-text available
Emotion recognition systems have made substantial progress through deep learning technologies, enabling machines to interpret human affect with remarkable accuracy. However, most existing models are trained on culturally homogeneous datasets, often overlooking significant variations in how emotions are expressed and perceived across different cultu...
Article
Full-text available
The advent of quantum computing marks a pivotal shift in the landscape of information security, with the potential to render widely adopted cryptographic systems such as RSA and Elliptic Curve Cryptography (ECC) obsolete. This paper investigates the profound implications of quantum computing on existing encryption standards, drawing from recent adv...
Article
Full-text available
Speech Emotion Recognition (SER) has become a pivotal area in human-computer interaction, aiming to equip machines with the ability to discern human emotions through speech. Traditional methods often rely on handcrafted features, which may not capture the intricate patterns of emotional expression. This study explores the integration of Mel-Spectro...
Article
Full-text available
Emotion detection is a fundamental component of affective computing, with widespread applications in human-computer interaction, mental health monitoring, and intelligent virtual assistants. While unimodal approaches relying on either text, audio, or facial expressions have made significant strides, they often fall short of capturing the complexity...
Article
Full-text available
The integration of Federated Learning (FL) and Blockchain technology presents a promising approach to address privacy and security challenges in e-health data sharing within smart healthcare systems. This article explores the synergistic potential of combining FL's decentralized data processing with Blockchain's immutable and transparent ledger to...
Article
Full-text available
Glomerular diseases are diagnostically complex due to their diverse clinical presentations and underlying etiologies. The diagnostic process begins with a detailed patient history and physical examination, focusing on signs and symptoms indicative of glomerular pathology. Essential laboratory evaluations include urinalysis, emphasizing proteinuria...
Article
Full-text available
In today's dynamic fashion retail landscape, data-driven merchandising has emerged as a critical strategy for maintaining competitiveness and meeting rapidly evolving consumer demands. This paper explores the integration of business analytics into fashion merchandising to optimize inventory management, pricing strategies, trend forecasting, and cus...
Article
Full-text available
Gender equality remains a crucial global concern, and in the context of the Middle East, it emerges as both a complex challenge and a strategic opportunity. This article examines the multifaceted landscape of gender equality across Middle Eastern societies by analyzing cultural, legal, political, and economic barriers while highlighting reformative...
Article
Full-text available
Modern regulatory requirements demand organisations maintain complete transparency and precise trackability of data pipelines, which mainly apply to Extract Transform Load (ETL) operations. Data provenance management and lineage need proper control to produce reliable regulatory reports that withstand inspections from GDPR and BCBS 239 and HIPAA an...
Article
Full-text available
SQL Injection (SQLi) persists as a major threat to .NET applications since attackers can inject harmful SQL code into databases for database manipulation purposes. The presence of this vulnerability leads to hackers gaining access to unauthorized data and causing system integrity failure while resulting in lost data which threatens organizations ut...
Article
Full-text available
Gender equality remains a crucial global concern, and in the context of the Middle East, it emerges as both a complex challenge and a strategic opportunity. This article examines the multifaceted landscape of gender equality across Middle Eastern societies by analyzing cultural, legal, political, and economic barriers while highlighting reformative...
Article
Full-text available
Loneliness among adults has emerged as a significant public health concern, especially in increasingly digitized and socially fragmented societies. With technological advancements in artificial intelligence (AI), the development of emotionally responsive AI companions presents a promising avenue for mitigating the adverse effects of loneliness. Thi...
Article
Full-text available
Loneliness is a growing concern among middle-aged adults, often exacerbated by lifestyle changes, career stress, family transitions, and digital-era isolation. As social connection becomes increasingly mediated through technology, artificial intelligence (AI)-based social support systems-such as intelligent chatbots, virtual companions, and emotion...
Conference Paper
Full-text available
Drilling operations in general, maybe in oil and gas industry in particular give rise to large volumes of waste products such as drilling fluids, cuttings, among others. These wastes are also dangerous to the environment as they may pollute ground water, affect soil and also disrupt ecosystems. Energy requirement grows daily while the concern for t...
Article
Full-text available
As the global population of older adults continues to rise, social isolation has emerged as a pressing public health issue, particularly in the United States and other developed nations. In response, the integration of Artificial Intelligence (AI) companions-ranging from conversational agents to socially assistive robots-has gained traction as a po...
Article
Full-text available
In the modern digital ecosystem, where cyber threats have evolved in complexity, frequency, and impact, maintaining system integrity during attacks has become a mission-critical priority for organizations. This study explores how artificial intelligence (AI) and resilient data structures can be deployed as proactive defense mechanisms in high-press...
Article
Full-text available
Adversarial Machine Learning (AML) has emerged as a significant concern in the field of cybersecurity, particularly as Artificial Intelligence (AI) and Machine Learning (ML) become increasingly integrated into critical systems. AML involves the strategic manipulation of input data to deceive ML models, leading to incorrect outputs and, ultimately,...
Article
Full-text available
The paradigm of serverless data engineering lets organizations perform data management along with analysis and processing through infrastructure without any maintenance responsibilities. Deciding to implement cloud-based serverless platforms delivers enhanced scalability together with cost-efficiency and operational agility to enterprises. Serverle...
Article
Full-text available
The rapid advancement of quantum computing technology poses an existential threat to contemporary cryptographic schemes, particularly those underpinning authentication protocols. These protocols, which currently rely heavily on the mathematical complexity of classical cryptographic primitives, face potential vulnerabilities in the post-quantum era...
Article
Full-text available
The proliferation of artificial intelligence (AI) has transformed not only defensive cybersecurity practices but also the offensive capabilities of threat actors. Among the most alarming advancements is the application of AI in the discovery and exploitation of zero-day vulnerabilities-flaws unknown to software vendors and, therefore, unpatched. Th...
Article
Full-text available
The rapid evolution of artificial intelligence (AI) has brought about transformative advancements across various sectors, but it has also introduced new challenges in the realm of cybersecurity. AI-powered cybercrime, characterized by increasingly sophisticated, automated, and adaptive attacks, poses unique ethical and legal dilemmas. This article...
Article
Full-text available
The evolution of ransomware from crude, indiscriminate attacks to highly sophisticated, targeted campaigns is now being accelerated by the integration of Artificial Intelligence (AI). AI-powered ransomware represents a formidable advancement in cybercrime, with capabilities that enable intelligent target profiling, adaptive negotiation strategies,...
Article
Full-text available
The advent of quantum computing promises significant advancements across various sectors, but it also presents a formidable challenge to the traditional encryption methods that have long been the cornerstone of data security. As quantum computers evolve, they have the potential to render current cryptographic protocols obsolete, posing risks to sen...
Article
Full-text available
Understanding root canal morphology is critical for successful endodontic treatment. Machine learning (ML) models provide automated and precise analysis of root canal anatomy using imaging datasets, reducing diagnostic errors and improving treatment planning. This article evaluates various ML approaches and their effectiveness in morphologic classi...
Article
Full-text available
Machine learning (ML) systems, particularly deep learning models, have seen widespread adoption across various industries, including healthcare, finance, and autonomous systems. Despite their impressive performance, these models are vulnerable to adversarial attacks-carefully crafted perturbations to input data that mislead ML systems into making i...
Article
Full-text available
Systemic health conditions, including diabetes, cardiovascular diseases, and immunocompromised states, may affect healing and success rates of periapical surgery. This review explores the correlation between systemic disorders and postoperative outcomes, emphasizing the need for tailored perioperative management to enhance prognosis in affected pat...
Article
The sociocultural factors impacting on fertility behavior among the Yoruba of Nigeria were investigated in a sample of 330 women, 199 from Ife-Ife urban area and 131 from 3 rural villages also in the Oranmiyan Local Government Area. All study participants were Yoruba women married to Yoruba men who had at least 1 child; their mean age was 34.5 year...
Article
Full-text available
This study was conducted to evaluate the feeding value of fungi treated Jatropha curcas kernel cake on feed intake, weight gain /loss , digestibility coefficient and blood parameters of West African dwarf goat. Five diets were formulated with diet A (control, without Jatropha curcas kernel cake); B (50% Penicillium treated Jatropha curcas kernel ca...

Network

Cited By