Olusegun FolorunsoFederal University of Agriculture · Department of Computer Sciences
Olusegun Folorunso
About
81
Publications
66,780
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,629
Citations
Introduction
Publications
Publications (81)
Researchers have reflected on personal traits that may predict Social Networking Sites (SNS) addiction. However, most of the researchers involved in the findings of personality traits predictor for social networking addiction either postulate or based their conclusions on analytical tools. Moreso, a review of the literature reveals that the predict...
The key challenges for automatic hate-speech classification in Twitter are the lack of generic architecture, imprecision, threshold settings and fragmentation issues. Most studies used binary classifiers for hate speech classification, but these classifiers cannot really capture other emotions that may overlap between positive or negative class. He...
Twitter is a microblogging tool that allow the creation of big data through short digital contents. This study provides a survey of machine learning techniques for hate speech classification from Twitter data streams. Hate speech classification in Twitter data streams has remain a vibrant research focus, but little research efforts have been devote...
Purpose
Hate speech is an expression of intense hatred. Twitter has become a popular analytical tool for the prediction and monitoring of abusive behaviors. Hate speech detection with social media data has witnessed special research attention in recent studies, hence, the need to design a generic metadata architecture and efficient feature extracti...
Purpose
Over the past decade, the cost of product development has increased drastically, and this is due to the inability of most enterprises to locate suitable and optimal collaborators for knowledge sharing. Nevertheless, knowledge sharing is a mechanism that helps people find the best collaborators with relevant knowledge. Hence, a new approach...
Recently, researchers discovered that the major problems of mining event logs is to discover a simple, sound and complete process model. But since the mining techniques can only reproduce the behaviour recorded in the log, the fitness of the reproduced model is a function of the event log completeness. In this paper, a Fuzzy-Genetic Mining model ba...
Computer networks are rapidly becoming a must in today business organization leading to a growth in the number of computer networks and networks users. As networks become more abundant, the quality of service received by user of network begin to degrade, therefore it becomes increasingly imperatives to focus on the quality of service (QoS) that is...
A signature-based system (SBS) is a common approach for intrusion detection and the most preferable by researchers. In spite of the popularity of SBS, it cannot detect new attacks on the network compared to anomaly-based systems (ABS). The most challenging problem of SBS is keeping an up-to-date database of known attack signatures and the setting o...
Distributed Knowledge Management Systems (DKMS) often depends on the Semantic Web Peer-to-Peer (SW-P2P) model. The reason for this is based on its support for autonomy of knowledge node, ease of accessibility and scalability. The susceptibility to failure experienced during knowledge retrieval has been a concern for the SW-P2P.ª¤? This paper prese...
The former President Umaru Musa Yar'adua has already unveiled a mission, setting an agenda of industrializing Nigeria, by 2020 which is also an integral part of the present administration's agenda. For this mission to be realized, electricity sector must be accorded paramount priority. To ensure adequate planning and management of electricity deman...
Concepts like Collaboratory Filtering (CF) and Group Recommender Systems (GRS) present the problems of finding active users group and modeling of users' group affective state respectively. Hence, using group ratings for individual recommendation becomes essential for enhancing the combine problems of CF and GRS as well as providing secured and accu...
The information explosion has created diverse challenges in the Web for effective and efficient relevant search of information to meet user's need using Information Retrieval System (IRS). The major challenge facing IRS is the possibility of retrieving only the relevant documents for the user's queries. The use algorithm that provides precision and...
The extraction of patterns and rules from large distributed databases through existing Distributed Association Rule Mining (DARM) systems is still faced with enormous challenges such as high response times, high communication costs and inability to adapt to the constantly changing databases. In this work, a Partition Enhanced Mining Algorithm (PEMA...
An important obligation of educational planning is the projection of students’ enrollment which forms the basis for many of the investment decisions. Enrollment projection provides information for decision making and budget planning hence, it is important to the development of higher education. As many factors have impacts on the enrollment number,...
In this paper, a fuzzy expert system-based Knowledge Sharing Trust Level measurement adoption model is presented. The KSTL was modeled using four input variables, developed from Technology Acceptance Model constructs: namely, Perceived Trust Toward Competence, Perceived Trust Toward Benevolence, Perceived Trust Barrier for Sharing, External Cue Tow...
The observed poor quality of graduates of some Nigerian Universities in recent times has been traced to non-availability of adequate mechanism. This mechanism is expected to assist the policy maker project into the future performance of students, in order to discover at the early stage, students who have no tendency of doing well in school. This st...
The importance of citizen's participation in government cannot be overemphasized. Governments in many developing countries have made efforts, in spite of their infrastructural and financial limitations, to uphold the virtues of participatory e-governance with limited success. A major cause of this elusive success is the design of e-government platf...
Decision making process in stock trading is a complex one. There are numbers of technical indicators that are used by traders to study trends of the market and make buying and selling decisions based on their observations. This research seeks to deploy fuzzy inference to stock market, with four indicators used in technical analysis to aid in the de...
Crowdsourcing have been widely accepted across a broad range of application areas. In Crowdsourcing environments, the possibility of performing human computation is characterized with risks due to the openness of their web-based platforms where each crowd worker joins and participates in the process at any time, causing serious effect on the qualit...
Insider attack and espionage on computer-based information is a major problem for business organizations and governments. Knowledge Management Systems (KMSs) are not exempt from this threat. Prior research presented the Congenial Access Control Model (CAC), a relationship-based access control model, as a better access control method for KMS because...
Electronic voting—the use of computers or computerized voting equipment to cast and tabulate and tally ballots in an election in a trustable manner—is a pillar of e-Government. The DynaVote voting protocol system proposed by Cetinkaya and Koc (2007) is assumed secure and practicable on a network. However, the DynaVote e-Voting protocol does not com...
All the proposed window based congestion control protocols use a single slow start algorithm. It has been shown in literature that slow start inefficiently utilizes bandwidth in a network with high bandwidth delay product (BDP). A multiple startup algorithm (E-speed start) was proposed in this work. E-speed start specifies a multiple selectable sta...
Current and real association rule mining tasks can only be successfully done in a distributed setting where transaction data sites are mined dynamically and appropriately as they are updated. Mobile agents' paradigms are now used to mine association rules in such circumstances. As these mobile agents travel in the distributed association rules mini...
Contention Awareness Input Selection (CAIS) technique was recently compared with traditional input selection techniques such as First Come First Serve (FCFS) and Round Robin (RR) as a way of improving routing techniques and proved to outperform the two techniques but not widely accepted because of packet starvation problem. In this paper, Contentio...
Association rule mining, which is a data mining technique, finds interesting association or correlation relationships among a large set of data items. Current association rule mining tasks can only be accomplished successfully only in a distributed setting, which will require integration of knowledge generated from the multiple data sites. Most exi...
Purpose
This paper aims to focus on how the advantages of computer mediated social networks (CMSN) can be effectively harnessed to create value for organizations in the form of ready knowledge and quick solutions to problems.
Design/methodology/approach
A knowledge capture technique – the Delphi technique – was fused into the social networking pro...
Masquerading is a security attack in which an intruder assumes the identity of a legitimate user. Semi-global alignment algorithm has been the best of known dynamic sequence alignment algorithm for detecting masqueraders. Though, the algorithm proves better than any other pair-wise sequence alignment algorithms such as local and global alignment al...
Electronic voting—the use of computers or computerized voting equipment to cast and tabulate and tally ballots in an election in a trustable manner—is a pillar of e-Government. The DynaVote voting protocol system proposed by Cetinkaya and Koc (2007) is assumed secure and practicable on a network. However, the DynaVote e-Voting protocol does not com...
In traditional computing environments, users actively choose to interact with computers. However, ubiquitous computing applications are embedded in the users' physical environments and integrate seamlessly with their everyday tasks which offer a new opportunity to augment people's lives with technology that provides increased communications, awaren...
In the context of Service-Oriented Architecture (SOA), complex systems can be realized through the visualization of business driven processes. The automation of Service Supported Systems (SSS) is the future integral part of core SOA which provides preprocessed information and solution suggestions for the Cloud Computing Users (CCU). CCU requires co...
In traditional computing environments, users actively choose to interact with computers. However, ubiquitous computing applications are embedded in the users' physical environments and integrate seamlessly with their everyday tasks which offer a new opportunity to augment people's lives with technology that provides increased communications, awaren...
In traditional computing environments, users actively choose to interact with computers. However, ubiquitous computing applications are embedded in the users' physical environments and integrate seamlessly with their everyday tasks which offer a new opportunity to augment people's lives with technology that provides increased communications, awaren...
There is no field more challenging than information processing and computers. The field change significantly almost every month, it is a field that combines all other disciplines, and almost everybody needs a working knowledge because virtually everybody now uses computer either for office or personal applications, managing household finances, writ...
In this work, a countermeasure scheme known as the “Fool the Keylogger Model (FKM) “ was developed for preventing keylogging attacks on Password Authentication Systems. In the FKM, an algorithm called Secured Keystroke Authenticated Password Against Keylogger (SKAPAK algorithm) was developed for dissuading attackers. The model divides the process o...
Association rule mining is today one of the most important aspects of data mining tasks. Data mining itself has shifted from stand-alone systems to distributed databases since most real life data are now distributed. Current studies in these areas are also considering the adoption of mobile agents in mining association rules from these distributed...
Network congestion and signal quality degradation are the major problems of the Global System for Mobile communication (GSM) most especially as the number of customers increases. They are issues that constantly and continuously demand for further researches to improve network performance. Congestion in various systems has always been tackled with v...
Transmission control protocol (TCP) has undergone several transformations. Several proposals have been put forward to change the mechanisms of TCP congestion control to improve its performance. A line of re-search tends to reduce speed in the face of congestion thereby penalizing itself. In this group are the window based congestion control algorit...
Insider attack and espionage on computer-based information is a major problem for business organizations and governments. Knowledge Management Systems (KMSs) are not exempt from this threat. Prior research presented the Congenial Access Control Model (CAC), a relationship-based access control model, as a better access control method for KMS because...
____________________________________________ ABSTRACT This paper describes the design outcomes and user evaluation of a Reinforced Concrete Design (RCD) interface for Beams from a user-centric point of view. The design began with a user interface proposal that was shown to Reinforced Concrete Designers to gather first reactions. Based on feedback t...
____________________________________________ ABSTRACT This paper describes the design outcomes and user evaluation of a Reinforced Concrete Design (RCD) interface for Beams from a user-centric point of view. The design began with a user interface proposal that was shown to Reinforced Concrete Designers to gather first reactions. Based on feedback t...
Distributed systems have really gained ground in several applications domains. Recently, extracting valuable
knowledge from large volumes of data in distributed setting is a major concern for most organizations. There is therefore need for architectures and models for efficient mining associations and connections from such data. Many models have be...
With the ever-growing database sizes, we have enormous quantities of data. Therefore, there is a desperate need to discover hidden knowledge in most cases in such data, but the extraction of it is a very time and resources consuming operation. Association rule mining, a data mining technique finds interesting association or correlation relationship...
Knowledge Sharing Adoption Model called (KSAM) was developed in this paper using Artificial Neural Networks (ANN). It investigated students’ Perceived Usefulness and Benefits (PUB) of Knowledge Sharing among students of higher learning in Nigeria. The study was based on the definition as well as on the constucts related to technology acceptance mod...
Till date, e-commerce organizations still have competency challenges in Customer Knowledge Management (CKM). Organizations need to develop competencies in all aspects of CKM, from understanding who their customers really are and what they want, to designing platforms specifically for customers. It is particularly important for customer processes in...
Recently, the use of mobile applications in knowledge management systems has been a major discussion in some literatures. In the past, the author's conceptualized and designs a knowledge management system for "Ifa". In this paper, a mobile application is designed which applies mobile knowledge management (mKM) to the "ifa" oracle consultation proce...
Multi-dimensional Constrained Gradient Mining, which is an aspect of data mining, is based on mining constrained frequent gradient pattern pairs with significant difference in their measures in transactional database. Top-kFp-growth with Gradient Pruning and Top-k Fp-growth with No Gradient Pruning were the two algorithms used for Multi-dimensional...
Real Time Database Systems (RTDBS) designers are charged with systems that produces results in a timely _nd consistent fashion. Therefore, the design of this kind of databases needs user requirements to support _oth data structures and the dynamic behaviours of the database algorithms using visualization technique. _n this paper, we present a user-...
The two major algorithms in the Additive Increase, Multiplicative Decrease Network Congestion Control Algorithm (AIMD) are
the slow start and the congestion avoidance. Much works has been done on improving the congestion avoidance stage. Not until
recently has attention shifted to slow start. The proposals for improving slow start include swift sta...
The use of e-commerce has been associated with a lot of skepticism and apprehension due to some crimes associated with e-commerce
and specifically to payment systems. The secure socket layer (SSL) protocol is trusted in this regard to secure transactions
for sensitive applications like e-commerce. Unfortunately, the use of SSL protocol causes slow...
Manufacturers, wholesalers and retailers in the distribution chain can be seen as Community of Core Knowledge Practitioners (CoCKPs) working together towards making profit, satisfying and meeting the needs of consumers of finished goods or products. Retailers through business transactions deal directly with the end users and are seen to better unde...
Purpose
In tertiary institution, some students find it hard to learn database design theory, in particular, database normalization. The purpose of this paper is to develop a visualization tool to give students an interactive hands‐on experience in database normalization process.
Design/methodology/approach
The model‐view‐controller architecture is...
This study employed the use of Cellular Neural Networks (CNN) for Edge Detection in images due to its high operational speed. The process of edge detection is unavoidable in many image processing tasks such as obstacle detection and satellite picture processing .The conventional edge detector models such as Sobel Operator, Robert Cross, among which...
In this paper, a system for controlling transaction flow in card-based payment systems and its per-formance benefit using mobile agents is presented. The model consists of the negotiation seman-tics, the mobile agent module, and three interactive systems in e-payment: the bank, point-of-sale (POS), and the Interswitch. We present a mobile agent-bas...
This work examines the effect of block sizes on attributes (robustness, capacity, time of water-marking, visibility and distortion) of watermarked digital images using Discrete Cosine Transform (DCT) function. The DCT function breaks up the image into various frequency bands and allows watermark data to be easily embedded. The advantage of this tra...
Diffusion of Innovations (DOI) is a theory of how, why, and at what rate newideas and technology spread through cultures. This study tested the attributes ofDOI empirically, using Social networking sites (SNS) as the target innovation.The study was conducted among students of the University of Agriculture,Abeokuta in Nigeria. The population compris...
This paper describes an approach to visualizing the detection of failure in Reinforced Concrete Beam Structure under various types of loadings. Several Reinforced Concrete Design (RCD) tools have been developed to support RCD, but there is little evidence that these solutions address the needs of the users. We studied RCD analysts' daily activities...
This paper describes an approach to visualizing the detection of failure in Reinforced Concrete Beam Structure under various types of loadings. Several Reinforced Concrete Design (RCD) tools have been developed to support RCD, but there is little evidence that these solutions address the needs of the users. We studied RCD analysts' daily activities...
Purpose
The purpose of this paper is to develop a multi‐user electronic bill presentment and payment (EBPP) model that would enhance the present billing systems as well as overcome the problems of periodic generation of billing reports and mail volumes.
Design/methodology/approach
The paper evaluates three existing models of EBPP: Biller‐direct, c...
The prediction of product acceptability is often an additive effect of individual fuzzy impressions developed by consumer on certain underlying attributes characteristic of the product. In this paper we present the development of a data-driven fuzzy-rule-based approach for predicting the overall sensory acceptability of food products in this case c...
Purpose
– The purpose of this paper is to suggest a conceptual analysis and design of knowledge management (KM) system for “Ifa” divination. In previous research, a randomized expert system for “Ifa” was proposed. In the system, the signatures of the divine‐chain are simulated through randomization process from 1 to 16, triggering the inference eng...
Image edge detection is a process of locating the edge of an image which is important in finding the approximate absolute gradient magnitude at each point I of an input grayscale image. The problem of getting an appropriate absolute gradient magnitude for edges lies in the method used. The Sobel operator performs a 2-D spatial gradient measurement...
Adverts are used to make services and products known to its likely users or consumers in a very easy and dynamic way. These have become one major medium which business, organization or establishment could function effectively in a compe titive environment. Manufacturers and or- ganizations use adverts as a means of reaching their intending customer...
Image edge detection is a process of locating the edge of an image which is important in finding the approximate absolute gradient magnitude at each point I of an input grayscale image. The problem of getting an appropriate absolute gradient magnitude for edges lies in the method used. The Sobel operator performs a 2-D spatial gradient measurement...
Adverts are used to make services and products known to its likely users or consumers in a very easy and dynamic way. These have become one major medium which business, organization or establishment could function effectively in a competitive environment. Manufacturers and organizations use adverts as a means of reaching their intending customers,...
This paper describes an approach to visualizing concurrency control (CC) algorithms for real-time database systems (RTDBs). This approach is based on the principle of software visualization, which has been applied in related fields. The Model-View-controller (MVC) architecture is used to alleviate the black box syndrome associated with the study of...
Purpose
– The need for maximum cognition from massive amounts of data is becoming explosive. Different visualization mechanisms are being introduced to achieve this aim. This paper aims to consider the state of organizations as regards being abreast with the recent visualization technologies.
Design/methodology/approach
– In this paper, the author...
This research investigates the applicability of Davis's Technology Acceptance Model (TAM) to agriculturist's acceptance of a knowledge management system (KMS), developed by the authors. It is called AGROWIT. Although the authors used previous Technology Acceptance Model user acceptance research as a basis for investigation of user acceptance of AGR...
Purpose
– This paper seeks to describe the use of edge‐detection as an approach to support the process of analyzing visual scenes.
Design/methodology/approach
– Edges‐detection is considered as a KM technique task. Several edge‐detection algorithms were discussed but Canny method was chosen in conjunction with JAVA to find the edges of an image....
Purpose
– Education delivery via electronic media is becoming relevant in Nigeria educational systems, especially the universities. In spite of this, there are hindrances affecting the total acceptability of this technology.
Design/methodology/approach
– In this paper, we investigated these critical factors by analyzing the questionnaires collecte...
In this study, we describe possibilities of adding encryption to the compression features of Huffman algorithm. The encryption ciphers used are Polyalphabetic substitution cipher (public key) and Stream cipher (private key). The former encodes by representing two or more ciphertext in the substitution process. This made it very difficult for snifer...
Internet access and agent technology promises to revolutionize the landscape of agricultural business. Already E-commerce is clearly beginning to have a major impact in the agricultural sector. The way people go about purchasing agricultural products is of great concern. Sometimes buyers have to travel far distances to get agricultural products and...
Purpose
– Business process redesign (BPR) is undertaken to achieve order‐of‐magnitude improvements over “old” forms of the organization. Practitioners in academia and the business world have developed a number of methodologies to support this competitive restructuring that forms the current focus of concern, many of which have not been successful....