Festus Adeyinka Osuolale

Festus Adeyinka Osuolale
  • B.Tech, M.Tech, Ph.D
  • Federal University of Technology

About

20
Publications
22,491
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
36
Citations
Introduction
Osuolale A. Festus holds a Ph.D degree in Computer Science from the Federal University of Technology, Akure, Nigeria in 2021. A former banker who has worked in the Information Technology Unit of the United Bank for Africa Plc, Nigeria for half a decade before joining the teaching profession with the FUT, Akure, Nigeria in 2013. His research interests include: Cloud and Fault Tolerance Computing, HPC, Computer and Internet Security, Computer Architecture and Operating Systems.
Current institution
Federal University of Technology

Publications

Publications (20)
Article
Cloud-Enabled Digital Cash Transaction System
Article
Full-text available
The Fourth Industrial Revolution is driven by cloud computing for increased productivity and efficiency. Despite the influence of cost-effectiveness, on-demand service and scalability, cloud computing is faced with many challenges such as security, performance, and fault tolerance. This research proposes a reactive mitigation model using checkpoint...
Article
Full-text available
The introduction of computers has been a huge plus to human life in its entirety because it provides both the world of business and private an easy and fast means to process, generate and exchange information. However, the proliferation of networked devices, internet services and the amount of data being generated frequently is enormous. This poses...
Conference Paper
The introduction of computers has been a huge plus to human life in its entirety because it provides both the world of business and private an easy and fast means to process, generate and exchange information. However, the proliferation of networked devices, internet services and the amount of data being generated frequently is enormous. This poses...
Article
Cloud computing is not just a new technological phenomenal but the result of different existing technology evolving to make up the foundation of smart computing. The adoption of this technology has provided a great means of achieving efficient and sustainable online cloud services with significant reduction in maintenance cost. Cloud computing is b...
Article
Full-text available
Mobile and Wireless dissemination of information is becoming big business and also becoming critical in the public places because of the convenience the system affords. This technology is useful in advertisements, stock market information dissemination and so on. Information has lifespan; therefore opportunities are wasted daily as a result of lack...
Article
Full-text available
Security is a growing concern for any system from desktop to web applications. As data increases, there must be a database system that can safely deal with the current need. However, with update in database systems, comes vulnerabilities. Hence, the need to continuously keep this research in motion. This paper presents a comprehensive study of pote...
Article
Full-text available
The art of hiding information has been on for centuries and improvement and advancement have always accompanied information security to ensure the message gets to the intended recipient without compromise. Over the years, cryptography and steganography are the two major methods for securing, hiding and transmission of messages separately. The metho...
Article
Full-text available
Imagine a web-application in which a user can query varieties of information about an individual (like name, age, state of origin, driver’s license number, national identification number, etc.). This information would be stored on different databases, each having its own schema. Often times, these resources are replicated in different locations and...
Article
Imagine a web-application in which a user can query varieties of information about an individual (like name, age, state of origin, driver’s license number, national identification number, etc.). This information would be stored on different databases, each having its own schema. Often times, these resources are replicated in different locations and...
Article
Full-text available
In the emerging and keenly competitive telecommunications market, it is imperative for mobile telecom operators to carry out regular analysis of their massive stored call logs to maintain and manage their numerous subscribers. Such sequential stream data analysis requires an efficient data mining algorithm and techniques bearing in mind the challen...
Article
Full-text available
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the determination of auser being allowed access to a resource(s) is done cautiously. Alphanumeric password has beenused for authentication, however, it is inherently limited. Gr...
Article
Multicast packets authentication major challenges are high computation overhead incurred while signing multicast streams and authentication difficulty when there is one or more packet losses. In this paper, Information Dispersal Algorithm was used to construct the hash of each packet with the hash values of individual packets concatenated over mult...
Conference Paper
Full-text available
Cryptography is the science of writing in secret codes which can be achieved either by using software encrypter or hardware encrypter. This study presents the development of a pair of circuit system-based (hardware) cryptographic processor. The hardware encryption in this study was achieved using the bitwise logic operations in the registers of the...
Conference Paper
Full-text available
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the determination of a user being allowed access to a resource(s) is done cautiously. Alphanumeric password has been used for authentication, however, it is inherently limited....
Conference Paper
A risk is the possibility that an undesirable event could happen. Several risk management software tools have been developed in the past to address pressing industrial concerns such as risk identification and estimation, risk exposure, mitigation and keep track of risk positions and respective management plans. Several methods have been developed a...

Network

Cited By