Michael Agbaje

Michael Agbaje
Babcock University · Computer Science

Associate Professor Computer Science

About

24
Publications
22,109
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
35
Citations
Citations since 2016
17 Research Items
26 Citations
20162017201820192020202120220123456
20162017201820192020202120220123456
20162017201820192020202120220123456
20162017201820192020202120220123456
Introduction
Michael Agbaje currently works at the Computer Science, Babcock University. Michael does research in Software Engineering, Programming Languages and Computer Security and Reliability. Their current project is 'Phd thesis'.
Additional affiliations
June 2020 - present
Babcock University
Position
  • Professor (Associate)
Description
  • Teaching, supervision, research at Undergraduate and postgraduate level.
Education
September 2012 - June 2015
Babcock University
Field of study
  • Computer Science

Publications

Publications (24)
Article
Full-text available
In the internet, router plays a strategic role in the transmission of data packets. Active queue management (AQM) aimed at managing congestion by keeping a reduced average buffer occupancy and hence a minimal delay. The novel random early detection (RED) algorithm suffers from large average buffer occupancy and delay shortcomings. This problem is d...
Article
Full-text available
Cloud computing is a groundbreaking technique that provides a whole lot of facilities such as storage, memory, and CPU as well as facilities such as servers and web service. It allows businesses and individuals to subcontract their computing needs as well as trust a network provider with its data warehousing and processing. The fact remains that cl...
Article
Full-text available
In the beginning, computers were merely standalone systems that could repeat basic computations in a fixed number of times. Later, computers were tailored to compute answers to problems. Algorithms understandable by computers were developed and the task of determining which worked better with respect to run-time and complexity was left to the compu...
Article
Full-text available
Cognitive networks were developed to solve the current challenges in wireless networking by using established wireless spectrum because of the limited bandwidth available and the inefficiency of spectrum use. The CN with the fundamental ability of cognitive radio provides the spectrum-conscious model of wireless connections. This research provides...
Article
Full-text available
With an end goal to move the computing and networking industries from the present manual arrangement to automated solutions that are coordinated with the rest of the infrastructure, there have been a few developing technologies in the past couple of years, among them are cloud computing and network functions virtualization (NFV). "Comprehensively,...
Article
Full-text available
Moore's law will soon stop being applicable, and as at that time we will need a new form of computation which is Quantum Computing. For 50 years now, computers have been getting smaller and more powerful. Yet despite these advances, there are still many problems that cannot be solved by powerful computers and there is no guarantee we will be able t...
Conference Paper
Full-text available
The administration of justice is an important aspect of any government which could be enhanced by information technology. La w yers perform multitude s of tasks on a day - to - day basis which could be overwhelming in a developing democracy like ours. There is a large amount of work needed to be done by Lawy ers or Legal Practitioners, this work ca...
Article
Full-text available
The measure of computerized information being created and put away is expanding at a disturbing rate. This information is classified and handled to distil and convey data to clients crossing various businesses for example, finance, online networking, gaming and so forth. This class of workloads is alluded to as throughput computing applications. Mu...
Book
Full-text available
Broadcast monitoring is the process of tracking activities on broadcasting channels in compliance with intellectual rights and other broadcasting laws using the computer or human system.The existing monitoring system is complex ,not too effective and not widely acceptable. There are also some concern from parents on some impact of television progra...
Article
Digital watermarking is the process of embedding information into digital media such as image, audio or video data to easily identify the copyright ownership of the media. Such information is for different purposes, such as for broadcast monitoring, copyright protection, source tracking, and piracy deterrence and many others. It is usually embedded...
Conference Paper
Full-text available
Cyber security is generally an extension of the traditional information technology (IT) security that is aimed at protecting systems, applications and data that exposed to a variety of forms of attack via the internet, ranging from data theft and espionage to corruption of data and denial of service attacks. There is a need for an increase in cyber...
Article
Full-text available
This paper illustrates that cellular automata can drive the spread of gossips in our environment using stochastic model. The spread of rumour is encouraged by the use of homogeneous cells which can either be allowed or disallowed which is further influenced by a parity model in modelling physical science which comprises four cells signifying the wh...
Article
Full-text available
Parasitic computing is a programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the o...
Article
Full-text available
This work examines the effect of block sizes on attributes (robustness, capacity, time of water-marking, visibility and distortion) of watermarked digital images using Discrete Cosine Transform (DCT) function. The DCT function breaks up the image into various frequency bands and allows watermark data to be easily embedded. The advantage of this tra...
Article
Full-text available
This paper reviews the use of mobile phones for delivering examination results via Short Messag- ing Service (SMS) in a university where student who have written examinations and are anxious to see their results need to get their grades in a convenient and accessible way, whether in the comfort of their homes, on the road, or while at work. At this...
Article
Full-text available
The proliferation of digital audio file is costing loss of revenue to the owner of copyright information especially in the music industry. The paper brings to view works done by various on digital audio watermarking and using discrete wavelet transform (DWT) and discrete cosine transform (DCT) with chaotic watermarking towards carrying out investig...

Questions

Questions (5)
Question
Knowledge base Vs Knowledge graph vs ontologies vs semantic web
Question
I need lists of top journals in computing that are free or inexpensive.
Question
I want to see how a yoruba language compiler can influence the growth of computing in my country Nigeria. So I want to develop one.

Network

Cited By

Projects

Project (1)