Sam Ogunlere

Sam Ogunlere
Babcock University · Computer Science

About

36
Publications
73,411
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
92
Citations
Citations since 2016
21 Research Items
79 Citations
201620172018201920202021202205101520
201620172018201920202021202205101520
201620172018201920202021202205101520
201620172018201920202021202205101520

Publications

Publications (36)
Article
Full-text available
The security of homes and properties has always been a crucial concern as the rate of burglary and home breaking has been on the increase all through the years. Although various solutions have been proposed to tackle the problem, burglary and home breaking are still rife everywhere every day. The proposed research is a low-cost, highly configurable...
Article
Full-text available
Ethical issues involve diverse professions in which Information Technology project management (ITPM) is not an exception. ITPM professionals are obligated to perform a variety of tasks conscientiously and ethically because their decisions affect the performance and functionality of their product outcome, which in turn affect the welfare and wellbei...
Article
Full-text available
Ethical issues involve diverse professions in which Information Technology project management (ITPM) is not an exception. ITPM professionals are obligated to perform a variety of tasks conscientiously and ethically because their decisions affect the performance and functionality of their product outcome, which in turn affect the welfare and well-be...
Article
Full-text available
Conventionally, two design options of SET-RESET (SR) Flip Flops are in use, while twelve possible design options are available. This paper focuseson all the design options with a comparative analysison why the two most used options are considered feasible in the design of digital device applications.It is observed from this paper that conventional...
Article
Full-text available
Solid waste management is one of the demanding environmental challenges confronted by urban and rural areas of Nigeria. Trash is being thrown in open areas by people without a second thought on the consequences. Such trash gets carried away by wind or rain into the drains and becomes a source of obstruction with time thereby stopping free flow of w...
Article
Full-text available
Computer performance is increasingly limited by the performance of memory systems when compared to its processor counterpart. In other to bridge this gap, the computer memory is methodically examined from the transistor level to the memory element. Since the ultimate metric of memory system performance is related to how fast it can service critical...
Article
A lot of people in the world, mostly Nigerian have a limited knowledge of the crime occurring in cyberspace, known as cybercrime. Cybercrime happens in the world of computer and the Internet. This kind of crime has a severe impact on our economy, lives and society, because our society is becoming an information society, full of information exchange...
Article
Full-text available
Advancements in globalization and certain requirements of 21 st century industrial processes have necessitated the creation of certain temperature-critical locations – where it is important that environmental temperatures within the confines of such locations be kept within a certain range or never beyond certain critical limits. Such environments...
Article
Full-text available
The speed of operation of any computer is governed by the Processor and Memory. It becomes important therefore, that in order to improve the processing speed of a computer, both the Processor and Main Memory design must be improved. Hence, this study is aimed at increasing the Main Memory speed of a computer by redesigning the components that make...
Article
Full-text available
The concepts of Object-Based Databases (OBD), Object-Oriented databases (OODB) and Object Relational Databases (ORDB) are of paramount importance in today's technological development. A comparison analysis of the concepts and usage of these variants of databases is presented in this paper with respect to areas of applications and features for more...
Article
Full-text available
Computer performance is primarily affected by the processor and memory. If either one reaches its limits, the performance of the whole system degrades. As semiconductor technology advances, the performance gap between processor and memory has become one of the major issues in computer design. This situation causes a growing gap between processor an...
Article
Full-text available
Computer performance is increasingly limited by the performance of memory systems due to the fact that the rate of memory system performance increase has lagged the rate of processor performance increase in the past years. In other to bridge this gap, the computer memory is methodically examined from the transistor level to the memory element (Flip...
Article
Full-text available
Generally speaking, Ethical issues involve religion, philosophical paradigms, moral responsibilities, customs/cultural, societal beliefs, self conscience and professional rules and regulations as the case may be. A number of professional organizations in the field of computing have published their own code of ethics. Computing professionals are obl...
Article
Full-text available
The design of an efficient and high performance memory element known as Flip-Flop Extension verification is carried out to ascertain its efficiency and effectiveness over the conventional SR and JK Flip Flops. This is achieved through the analysis of the design data of the Flip Flop Extension in comparison with the existing related conventional Fli...
Article
The intelligent Car Park System is a system designed to prevent problems usually associated with car parks. This study would cover a wireless transmitter and receiver which is the sensor. The principle of electromagnetic field would be employed in which an inductor would be wound and buried under the entry and exit post of parking garage as a senso...
Article
Full-text available
Security in general is a major concern in our society today and over time, the security of vehicles has become a priority. Various inventions and technologies have been brought about to put minds at rest, but the complete eradication of theft of cars is much of a tedious task. A solution to knowing the location of vehicles either when they are stol...
Article
Cyber crime is a kind of crime that happens in cyberspace, that is, happens in the world of computer and the Internet. Cyber crime has become a global phenomenon; this kind of crime has the serious potential for severe impact on our lives, society, and economy because our society is becoming an information society where communication takes place in...
Article
Full-text available
A lot of people in the world, mostly Nigerian have a limited knowledge of the crime occurring in cyberspace, known as cybercrime. Cybercrime happens in the world of computer and the Internet. This kind of crime has a severe impact on our economy, lives and society, because our society is becoming an information society, full of information exchange...
Article
Full-text available
Heterogeneous network environment can be viewed as connecting computers and network devices such as switches, repeaters and routers with different protocols and different operating systems which varies in type, size, and topology; differences and how these networks can relate or interact with each other. Heterogeneous networks (HetNets) are an attr...
Article
Full-text available
Computer compatibility is an essential requirement when computer applications are being considered in any given environment. Compatibility is a design issue that affects both software and hardware components of computers. This paper examines how best to code computer data/characters in such a way that compatibility issue can be eliminated. The resu...
Article
Full-text available
This paper develops a sound theory of Complement Arithmetic which is used to perform arithmetic addition operations at the Arithmetic Logic Unit of any computer. It also examines the proofs that complements of negative numbers are used to convert subtraction operations into addition operations thereby fulfilling the basic requirements of a computer...
Article
Full-text available
The need for good and reliable data transmission within computer network and internet forms the basis for management and control of bandwidth. Without bandwidth management, an application or user will not be able to control all available bandwidth and prevent other applications or users from using the networks. It will be impossible to differentiat...

Network

Cited By