Shade O Kuyoro

Shade O Kuyoro
Babcock University · Computer Science

PhD

About

64
Publications
90,785
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
585
Citations
Citations since 2017
34 Research Items
364 Citations
20172018201920202021202220230204060
20172018201920202021202220230204060
20172018201920202021202220230204060
20172018201920202021202220230204060
Additional affiliations
February 2016 - July 2016
University of Computer Sciences and Skills in Łódź
Position
  • PostDoc Position
March 2015 - May 2015
University of Computer Sciences and Skills in Łódź
Position
  • PostDoc Position

Publications

Publications (64)
Conference Paper
Full-text available
Automating the process of malaria diagnosis is very crucial; malaria is a deadly disease with an annual infection rate between 300-500 million and a death rate of 1 million yearly. The diagnosis approach is manual and is subject to human error. In this current work, we automate the process of diagnosis and provide results in quantitative form with...
Conference Paper
Full-text available
Support Vector Machine (SVM) in dealing with a classification problem, separates classes using decision boundaries with the primary objective of establishing a large margin between support vectors of the respective class groups; it utilizes kernels to achieve non-linear decision boundaries. This current work examines the performance of four SVM ker...
Article
Full-text available
Network Intrusion Detection Systems (NIDS) can protect computer networks and computer systems by detecting abnormal network packets and taking agreed action plans, such as notifying an administrator or rejecting the network packets. In this study, the aim is the implementation of NIDS with improved performance using an ensemble of Support Vector Ma...
Article
Full-text available
University Management Information Systems (UMIS) are a very essential part of a school’s ecosystem. Trying to build a functional UMIS is no longer a serious issue, these days as students interact with this system to perform tasks such as course registration, school fee payment, etc., the ease at which they do these activities is extremely important...
Article
Educational evaluation is a major factor in determining students’ learning aptitude and academic performance. The scoring technique that relies solely on human labour is time consuming, costly, and logistically challenging as this rating is usually based on the opinion of “biased” human. Several studies have considered using machine learning techni...
Article
Full-text available
Assessment and ratings are crucial in the educational system. Specifically, in the process of manual scoring for essay which has shown to be inefficient and rigorous. The objective of the current study was to develop an intelligent essay scoring system using ensemble machine-learning techniques. Several grading rubrics have been identified from lit...
Article
Full-text available
Thousands of new threats and threat categories continue to emerge every second in cyberspace, even as known threats keep adapting robustly to existing solutions. This has challenged modern approaches and solutions to threat detection and potentially rendered some of these obsolete even before they are able to find applicability. Much contemporary c...
Article
Full-text available
Educational Institutions are facing enormous tasks of marking and grading students at the end of every examination within the shortest possible time. Marking theoretical essay questions which involves thousands of examinees can be biased, subjective and time-consuming, leading to variation in grades awarded by different human assessors. This study...
Article
Full-text available
Mobile health applications (mHealth apps) which are currently used for improving human body fitness and overall quality of life are becoming available. Designing and assessing the usability of these tools are major issues as evaluating them normally demands an already finished product that would have been in use for a long period of time. Moreover,...
Conference Paper
Full-text available
The choice of classification algorithm in Machine Learning (ML) is a major issue cutting across several disciplines due to the uncertainty in human judgment in the ranking of performance metrics. The process of algorithm selection can be modelled as Multi-Criteria Decision Making (MCDM) problem which involves more than one criterion. In this work,...
Article
Full-text available
Persuasive techniques are recently being explored by computer science researchers as an effective strategy towards creating applications that are aimed at positive attitudinal changes especially in the health domain but finding effective evaluation approaches for these technologies remain an herculean task for all stakeholders involved and in order...
Article
Full-text available
Formal Methods (FMs) can be used in varied areas of applications and to solve critical and fundamental problems of Performance Evaluation (PE). Modelling and analysis techniques can be used for both system and software performance evaluation. The functional features and performance properties of modern software used for performance evaluation has b...
Article
Association rule mining (ARM) is an aspect of data mining that has revolutionized the area of predictive modelling paving way for data mining technique to become the recommended method for business owners to evaluate organizational performance. Market basket analysis (MBA), a useful modeling technique in data mining, is often used to analyze custom...
Article
The collection and storing of medical records pertaining to the health status of patients in an electronic form so as to allow; easy access, information sharing and making better medical decisions among other things is known as an Electronic Health Record (EHR). Data generated by health care providers from patient‟s diagnosis, prescription, health...
Article
Poor voice quality in VoIP models during communication has been a common occurrence which VoIP users experience, this can be frustrating when users cannot communicate efficiently. Most people find it difficult to think straight when they make calls and there is an echo. In addition to this frustration, the caller’s money, time, effort, energy is al...
Article
Full-text available
Abstract: Structured Query Language Injection Attack (SQLIA) is one of the most prevalent cyber attacks against web-based application vulnerabilities; that are manipulated through injection techniques to gain access to restricted data, bypass authentication mechanisms, and execute unauthorized data manipulation language. There are several solutions...
Article
Full-text available
Structured Query Language Injection Attacks (SQLIA) from attackers’ exploit have progressively increased the danger of cyber attacks to steal confidential information from the database of vulnerable web application front-ends. These cyber attacks have potentially damaging security consequences. Several detection methods have been identified for eff...
Article
Full-text available
Blockchain is considered to be an emerging technology and was introduced through bitcoin. Blockchain can be described as a distributed ledger technology capable of recording safe and continuous transactions between parties. Attempts have been made to adapt the technology to other fields of implementation, outside finance, so that the interesting ch...
Article
Full-text available
Botnets have carved a niche in contemporary networking and cybersecurity due to the impact of their operations. The botnet threat continues to evolve and adapt to countermeasures as the security landscape continues to shift. As research efforts continue to seek a deeper and robust understanding of the nature of the threat for more effective solutio...
Article
Full-text available
Chronic Myeloid Leukemia (CML) had been stratified into risk groups using scoring systems but these systems have limitation of overfitting data. Machine Learning (ML) algorithms were used to extract meaningful information from the datasets, but the loss function (empirical risk) of the algorithms was not considered to determine the risk that was in...
Article
Full-text available
Cyber-Physical Systems (CPS) will revolutionize how humans relate with the physical world around us. Many grand challenges await the economically vital domains of transportation, health-care, manufacturing, agriculture, energy, defence, aerospace and buildings. Exploration of these potentialities around space and time would create applications whic...
Article
Full-text available
Mobile Ad-hoc Networks (MANETs) is a self-configurable network, such that nodes connect and disconnect from the other nodes in the network automatically at any point in time. MANETs are vulnerable to various security attacks due to its characteristics of flexibility, distributed operation, node to node connectivity and so on. The focus of this work...
Article
Data mining is a technique that has become a widely accepted procedure for organizations in sourcing for data and processing it for decision making. Association rule mining is an aspect of data mining that has revolutionized the area of predictive modelling paving way for data mining technique to become the recommended method for business owners to...
Article
Full-text available
The data-driven methods capable of understanding, mimicking and aiding the information processing tasks of Machine Learning (ML) have been applied in an increasing range over the past years in diverse areas at a very high rate, and had achieved great success in predicting and stratifying given data instances of a problem domain. There has been gene...
Conference Paper
Full-text available
Several factors play major roles in shaping and determining the objective and effect of a game in any system of education. Unfortunately, many business games do not consider socio-cultural and environmental differences as major factors which affect the level of managerial competencies and business acumen. This work briefly discusses the factors tha...
Article
Full-text available
Big data is a key concept that cannot be overlooked in the IT world considering the prominent increase in data, and data related services, it is important to explore this field and look at ways to improve data service delivery especially in the cloud. Cloud computing on the other hand helps in tackling the issue of storage and data service. This re...
Article
Full-text available
The usability of Electronic Health Record systems, while recognized as critical for successful adoption and meaningful use, has not historically received the same level of attention as other software features, functions, and technical requirements. In the Nigerian healthcare sector, it was observed that only few had adopted the use of electronic he...
Article
Full-text available
For some time now, people have speculated on what makes the living different from the non-living; and what the possibility of creating synthetic system from natural system is. From the mid-1980s, artificial life (ALife) has studied living systems using a synthetic approach. This approach builds life in order to understand it better in any of the th...
Article
Project management is a discipline faced with the challenge of achieving all of the project goals and objectives while honoring the preconceived constraints (scope, time, quality and budget) and thus optimizing the allocation of necessary inputs and integrating them to meet pre-defined objectives. This study seeks to explore the awareness of projec...
Article
Full-text available
To enhance network performance, PHY and MAC layer has direct influence besides other factors as these are major layers of OSI based communication system. One way of enhancing network performance is the managing the radio resources intelligently. As cross layer based systems might be faster responding in case of network resource distribution and due...
Article
Full-text available
In recent times, contemporary hospitals continue to become smart by automating their administrative processes using up to date equipment and incorporating latest technological principles into their activities. It has been seen over the years that the area of medical diagnosis systems require the use of diagnostic systems as they have been proven to...
Article
Full-text available
There is a growing awareness among researchers about the apparent variations in the academic performance of students in tertiary institutions. Although, many studies have employed traditional statistical methods in identifying the factors responsible for the disparity, the statistical tool for setting a yardstick is yet to be established. Machine l...
Article
Full-text available
Cloud computing, the technology that makes it possible for computing resources to be provisioned to clients / subscribers over long distances, as well as its component technology – virtualization, which makes it possible for multiple guest systems to co-reside on a single host machine and share the computing resources of the host, have both become...
Article
Full-text available
One of the emerging trends that have gained increasing prominence and is fast becoming a household name in the global IT industry is the concept of cognizant computing. Research has repeatedly suggested that this technology may hold the key to satisfying nearly all the computing needs of humanity even down to the preferences of the unique individua...
Article
Full-text available
Information and Communication Technology (ICT) is one of the main forces driving the present day business environment. ICT is dramatically informing business practices as well as the outcome of business engagements. There are many factors to consider in the successful adoption of ICT in SMES in developing countries. The development of the ICT solut...
Article
Full-text available
Over the years, several means of electrical power generation have been in place ranging from wood, coal, to fuel. All these means have at its point served purpose at the needed time. This work presents the historical research of solar power in space, an insight into some literature pertaining to Solar Power Satellite (SPS) and Wireless Power Transm...
Article
Full-text available
Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. Cloud users are expected to increase exponentially in the future. In order to prepare for this stipulated increase, analyses of various fac...
Article
Full-text available
Given the discouraging record of the traditional pension system and the limited coverage of the private-sector pension schemes, there is need for robust web-based pension fundmanagement system that can handle the pension process efficiently. This work focus on the design and implementation of a web-based pension fund management application toreplac...
Article
Full-text available
Cloud computing is the deployment of software, platform and infrastructure as a service by a third-party provider to consumers on a pay-as-you-go basis with the opportunity of expanding and contracting their service requirements as needed. It allows business organizations to utilize models that allow them to focus more on competence which improves...
Article
Information retrieval (IR) is the field of computer science that deals with the processing of documents containing free text, so that they can be rapidly retrieved based on keywords specified in a user's query. IR was born in the 1950s out of necessity to find useful information from large collections. Over the last sixty years, the field has matur...
Article
Full-text available
The need for good and reliable data transmission within computer network and internet forms the basis for management and control of bandwidth. Without bandwidth management, an application or user will not be able to control all available bandwidth and prevent other applications or users from using the networks. It will be impossible to differentiat...
Article
Full-text available
Web Services are a promising solution to an age-old need: fast and flexible information sharing among people and businesses. They represent the next phase of distributed computing, building on the shoulders of the previous distributed models. Web Services leverage the ubiquity of the Internet to link applications, systems, and resources within and...
Article
Full-text available
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexib...
Article
Full-text available
E-learning has been an important policy for education planners for many years in developed countries. This policy has been adopted by education in some developing countries; it is therefore expedient to study its emergence in the Nigerian education system. The birth of contemporary technology shows that there is higher requirement for education eve...
Data
Web Services are a promising solution to an age-old need: fast and flexible information sharing among people and businesses. They represent the next phase of distributed computing, building on the shoulders of the previous distributed models. Web Services leverage the ubiquity of the Internet to link applications, systems, and resources within and...
Data
Cloud computing is the deployment of software, platform and infrastructure as a service by a third-party provider to consumers on a pay-as-you-go basis with the opportunity of expanding and contracting their service requirements as needed. It allows business organizations to utilize models that allow them to focus more on competence which improves...
Article
Full-text available
Abstract— Microprocessors are applicable to a wide range of information processing tasks, ranging from general computing to real-time monitoring systems. The microprocessor facilitates new ways of communication and how to make use of the vast information available online and offline both at home and in workplace. Most electronic devices--including...

Questions

Question (1)
Question
What approach can be used to find empirical risk of a particular classifier in weka, for instance empirical risk minimization in logistic regression? I need the implementation of Empirical Risk Minimization on PART algorithm and logistic regression algorithm.
Thanks.

Network

Cited By