
Festus Adeyinka Osuolale- B.Tech, M.Tech, Ph.D
- Federal University of Technology
Festus Adeyinka Osuolale
- B.Tech, M.Tech, Ph.D
- Federal University of Technology
About
20
Publications
22,491
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
36
Citations
Introduction
Osuolale A. Festus holds a Ph.D degree in Computer Science from the Federal University of Technology, Akure, Nigeria in 2021. A former banker who has worked in the Information Technology Unit of the United Bank for Africa Plc, Nigeria for half a decade before joining the teaching profession with the FUT, Akure, Nigeria in 2013. His research interests include: Cloud and Fault Tolerance Computing, HPC, Computer and Internet Security, Computer Architecture and Operating Systems.
Current institution
Publications
Publications (20)
Cloud-Enabled Digital Cash Transaction System
The Fourth Industrial Revolution is driven by cloud computing for increased productivity and efficiency. Despite the influence of cost-effectiveness, on-demand service and scalability, cloud computing is faced with many challenges such as security, performance, and fault tolerance. This research proposes a reactive mitigation model using checkpoint...
The introduction of computers has been a huge plus to human life in its entirety because it provides both the world of business and private an easy and fast means to process, generate and exchange information. However, the proliferation of networked devices, internet services and the amount of data being generated frequently is enormous. This poses...
The introduction of computers has been a huge plus to human life in its entirety because it provides both the world of business and private an easy and fast means to process, generate and exchange information. However, the proliferation of networked devices, internet services and the amount of data being generated frequently is enormous. This poses...
Cloud computing is not just a new technological phenomenal but the result of different existing technology evolving to make up the foundation of smart computing. The adoption of this technology has provided a great means of achieving efficient and sustainable online cloud services with significant reduction in maintenance cost. Cloud computing is b...
Mobile and Wireless dissemination of information is becoming big business and also becoming critical in the public places because of the convenience the system affords. This technology is useful in advertisements, stock market information dissemination and so on. Information has lifespan; therefore opportunities are wasted daily as a result of lack...
Security is a growing concern for any system from desktop to web applications. As data increases, there must be a database system that can safely deal with the current need. However, with update in database systems, comes vulnerabilities. Hence, the need to continuously keep this research in motion. This paper presents a comprehensive study of pote...
The art of hiding information has been on for centuries and improvement and advancement have always accompanied information security to ensure the message gets to the intended recipient without compromise. Over the years, cryptography and steganography are the two major methods for securing, hiding and transmission of messages separately. The metho...
Imagine a web-application in which a user can query varieties of information about an individual (like name, age, state of origin, driver’s license number, national identification number, etc.). This information would be stored on different databases, each having its own schema. Often times, these resources are replicated in different locations and...
Imagine a web-application in which a user can query varieties of information about an individual (like name, age, state of origin, driver’s license number, national identification number, etc.). This information would be stored on different databases, each having its own schema. Often times, these resources are replicated in different locations and...
In the emerging and keenly competitive telecommunications market, it is imperative for mobile telecom operators to carry out regular analysis of their massive stored call logs to maintain and manage their numerous subscribers. Such sequential stream data analysis requires an efficient data mining algorithm and techniques bearing in mind the challen...
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and
valuable asset, such as person, community, nation, or organization. Thus, the determination of auser being allowed access to a resource(s) is done cautiously. Alphanumeric password has beenused for authentication, however, it is inherently limited. Gr...
Multicast packets authentication major challenges are high computation overhead incurred while signing multicast streams and authentication difficulty when there is one or more packet losses. In this paper, Information Dispersal Algorithm was used to construct the hash of each packet with the hash values of individual packets concatenated over mult...
Cryptography is the science of writing in secret codes which can be achieved either by using software encrypter or hardware encrypter. This study presents the development of a pair of circuit system-based (hardware) cryptographic processor. The hardware encryption in this study was achieved using the bitwise logic operations in the registers of the...
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the determination of a user being allowed access to a resource(s) is done cautiously. Alphanumeric password has been used for authentication, however, it is inherently limited....
A risk is the possibility that an undesirable event could happen. Several risk management software tools have been developed in the past to address pressing industrial concerns such as risk identification and estimation, risk exposure, mitigation and keep track of risk positions and respective management plans. Several methods have been developed a...