
Shade O KuyoroBabcock University · Computer Science
Shade O Kuyoro
PhD
About
64
Publications
90,785
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
585
Citations
Citations since 2017
Introduction
Additional affiliations
February 2016 - July 2016
March 2015 - May 2015
Publications
Publications (64)
Automating the process of malaria diagnosis is very crucial; malaria is a deadly disease with an annual infection rate between 300-500 million and a death rate of 1 million yearly. The diagnosis approach is manual and is subject to human error. In this current work, we automate the process of diagnosis and provide results in quantitative form with...
Support Vector Machine (SVM) in dealing with a classification problem, separates classes using decision boundaries with the primary objective of establishing a large margin between support vectors of the respective class groups; it utilizes kernels to achieve non-linear decision boundaries. This current work examines the performance of four SVM ker...
Network Intrusion Detection Systems (NIDS) can protect computer networks and computer systems by detecting abnormal network packets and taking agreed action plans, such as notifying an administrator or rejecting the network packets. In this study, the aim is the implementation of NIDS with improved performance using an ensemble of Support Vector Ma...
University Management Information Systems (UMIS) are a very essential part of a school’s ecosystem. Trying to build a functional UMIS is no longer a serious issue, these days as students interact with this system to perform tasks such as course registration, school fee payment, etc., the ease at which they do these activities is extremely important...
Educational evaluation is a major factor in determining students’ learning aptitude and academic performance. The scoring technique that relies solely on human labour is time consuming, costly, and logistically challenging as this rating is usually based on the opinion of “biased” human. Several studies have considered using machine learning techni...
Assessment and ratings are crucial in the educational system. Specifically, in the process of manual scoring for essay which has shown to be inefficient and rigorous. The objective of the current study was to develop an intelligent essay scoring system using ensemble machine-learning techniques. Several grading rubrics have been identified from lit...
Thousands of new threats and threat categories continue to emerge every second in cyberspace, even as known threats keep adapting robustly to existing solutions. This has challenged modern approaches and solutions to threat detection and potentially rendered some of these obsolete even before they are able to find applicability. Much contemporary c...
Educational Institutions are facing enormous tasks of marking and grading students at the end of every examination within the shortest possible time. Marking theoretical essay questions which involves thousands of examinees can be biased, subjective and time-consuming, leading to variation in grades awarded by different human assessors. This study...
Mobile health applications (mHealth apps) which are currently used for improving human body fitness and overall quality of life are becoming available. Designing and assessing the usability of these tools are major issues as evaluating them normally demands an already finished product that would have been in use for a long period of time. Moreover,...
The choice of classification algorithm in Machine Learning (ML) is a major issue cutting across several disciplines due to the uncertainty in human judgment in the ranking of performance metrics. The process of algorithm selection can be modelled as Multi-Criteria Decision Making (MCDM) problem which involves more than one criterion. In this work,...
Persuasive techniques are recently being explored by computer science researchers as an effective strategy towards creating applications that are aimed at positive attitudinal changes especially in the health domain but finding effective evaluation approaches for these technologies remain an herculean task for all stakeholders involved and in order...
Formal Methods (FMs) can be used in varied areas of applications and to solve critical and fundamental problems of Performance Evaluation (PE). Modelling and analysis techniques can be used for both system and software performance evaluation. The functional features and performance properties of modern software used for performance evaluation has b...
Association rule mining (ARM) is an aspect of data mining that has revolutionized the area of predictive modelling paving way for data mining technique to become the recommended method for business owners to evaluate organizational performance. Market basket analysis (MBA), a useful modeling technique in data mining, is often used to analyze custom...
The collection and storing of medical records pertaining to the health status of patients in an electronic form so as to allow; easy access, information sharing and making better medical decisions among other things is known as an Electronic Health Record (EHR). Data generated by health care providers from patient‟s diagnosis, prescription, health...
Poor voice quality in VoIP models during communication has been a common occurrence which VoIP users experience, this can be frustrating when users cannot communicate efficiently. Most people find it difficult to think straight when they make calls and there is an echo. In addition to this frustration, the caller’s money, time, effort, energy is al...
Abstract: Structured Query Language Injection Attack (SQLIA) is one of the most prevalent cyber attacks against web-based
application vulnerabilities; that are manipulated through injection techniques to gain access to restricted data, bypass authentication
mechanisms, and execute unauthorized data manipulation language. There are several solutions...
Structured Query Language Injection Attacks (SQLIA) from
attackers’ exploit have progressively increased the danger
of cyber attacks to steal confidential information from the
database of vulnerable web application front-ends.
These cyber attacks have potentially damaging security
consequences. Several detection methods have been
identified for eff...
Blockchain is considered to be an emerging technology and was introduced through bitcoin. Blockchain can be described as a distributed ledger technology capable of recording safe and continuous transactions between parties. Attempts have been made to adapt the technology to other fields of implementation, outside finance, so that the interesting ch...
Botnets have carved a niche in contemporary networking and cybersecurity due to the impact of their operations. The botnet threat continues to evolve and adapt to countermeasures as the security landscape continues to shift. As research efforts continue to seek a deeper and robust understanding of the nature of the threat for more effective solutio...
Chronic Myeloid Leukemia (CML) had been stratified into risk groups using scoring systems but these systems have limitation of overfitting data. Machine Learning (ML) algorithms were used to extract meaningful information from the datasets, but the loss function (empirical risk) of the algorithms was not considered to determine the risk that was in...
Cyber-Physical Systems (CPS) will revolutionize how humans relate with the physical world around us. Many grand challenges await the economically vital domains of transportation, health-care, manufacturing, agriculture, energy, defence, aerospace and buildings. Exploration of these potentialities around space and time would create applications whic...
Mobile Ad-hoc Networks (MANETs) is a self-configurable network, such that nodes connect and disconnect from the other nodes in the network automatically at any point in time. MANETs are vulnerable to various security attacks due to its characteristics of flexibility, distributed operation, node to node connectivity and so on. The focus of this work...
Data mining is a technique that has become a widely accepted procedure for organizations in sourcing for data and processing it for decision making. Association rule mining is an aspect of data mining that has revolutionized the area of predictive modelling paving way for data mining technique to become the recommended method for business owners to...
The data-driven methods capable of understanding, mimicking and aiding the information processing tasks of Machine Learning (ML) have been applied in an increasing range over the past years in diverse areas at a very high rate, and had achieved great success in predicting and stratifying given data instances of a problem domain. There has been gene...
Several factors play major roles in shaping and determining the objective and effect of a game in any system of education. Unfortunately, many business games do not consider socio-cultural and environmental differences as major factors which affect the level of managerial competencies and business acumen. This work briefly discusses the factors tha...
Big data is a key concept that cannot be overlooked in the IT world considering the prominent increase in data, and data related services, it is important to explore this field and look at ways to improve data service delivery especially in the cloud. Cloud computing on the other hand helps in tackling the issue of storage and data service. This re...
The usability of Electronic Health Record systems, while recognized as critical for successful adoption and meaningful use, has not historically received the same level of attention as other software features, functions, and technical requirements. In the Nigerian healthcare sector, it was observed that only few had adopted the use of electronic he...
For some time now, people have speculated on what makes the living different from the non-living; and what the possibility of creating synthetic system from natural system is. From the mid-1980s, artificial life (ALife) has studied living systems using a synthetic approach. This approach builds life in order to understand it better in any of the th...
Project management is a discipline faced with the challenge of achieving all of the project goals and objectives while honoring the preconceived constraints (scope, time, quality and budget) and thus optimizing the allocation of necessary inputs and integrating them to meet pre-defined objectives. This study seeks to explore the awareness of projec...
To enhance network performance, PHY and MAC layer has direct influence besides other factors as these are major layers of OSI based communication system. One way of enhancing network performance is the managing the radio resources intelligently. As cross layer based systems might be faster responding in case of network resource distribution and due...
In recent times, contemporary hospitals continue to become smart by automating their administrative processes using up to date equipment and incorporating latest technological principles into their activities. It has been seen over the years that the area of medical diagnosis systems require the use of diagnostic systems as they have been proven to...
There is a growing awareness among researchers about the apparent variations in the academic performance of students in tertiary institutions. Although, many studies have employed traditional statistical methods in identifying the factors responsible for the disparity, the statistical tool for setting a yardstick is yet to be established. Machine l...
Cloud computing, the technology that makes it possible for computing resources to be provisioned to clients / subscribers over long distances, as well as its component technology – virtualization, which makes it possible for multiple guest systems to co-reside on a single host machine and share the computing resources of the host, have both become...
One of the emerging trends that have gained increasing prominence and is fast becoming a household
name in the global IT industry is the concept of cognizant computing. Research has repeatedly suggested that this technology may hold the key to satisfying nearly all the computing needs of humanity even down to the preferences of the unique individua...
Information and Communication Technology (ICT) is one of the main forces driving the present day business environment. ICT is dramatically informing business practices as well as the outcome of business engagements. There are many factors to consider in the successful adoption of ICT in SMES in developing countries. The development of the ICT solut...
Over the years, several means of electrical power generation have been in place ranging from wood, coal, to fuel. All these means have at its point served purpose at the needed time. This work presents the historical research of solar power in space, an insight into some literature pertaining to Solar Power Satellite (SPS) and Wireless Power Transm...
Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. Cloud users are expected to increase exponentially in the future. In order to prepare for this stipulated increase, analyses of various fac...
Given the discouraging record of the traditional pension system and the limited coverage of the private-sector pension schemes, there is need for robust web-based pension fundmanagement system that can handle the pension process efficiently. This work focus on the design and implementation of a web-based pension fund management application toreplac...
Cloud computing is the deployment of software, platform and infrastructure as a service by a third-party provider to consumers on a pay-as-you-go basis with the opportunity of expanding and contracting their service requirements as needed. It allows business organizations to utilize models that allow them to focus more on competence which improves...
Information retrieval (IR) is the field of computer science that deals with the processing of documents containing free text, so that they can be rapidly retrieved based on keywords specified in a user's query. IR was born in the 1950s out of necessity to find useful information from large collections. Over the last sixty years, the field has matur...
The need for good and reliable data transmission within computer network and internet forms the basis for management and control of bandwidth. Without bandwidth management, an application or user will not be able to control all available bandwidth and prevent other applications or users from using the networks. It will be impossible to differentiat...
Web Services are a promising solution to an age-old need: fast and flexible information sharing among people and businesses. They represent the next phase of distributed computing, building on the shoulders of the previous distributed models. Web Services leverage the ubiquity of the Internet to link applications, systems, and resources within and...
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexib...
E-learning has been an important policy for education planners for many years
in developed countries. This policy has been adopted by education in some
developing countries; it is therefore expedient to study its emergence in the
Nigerian education system. The birth of contemporary technology shows that
there is higher requirement for education eve...
Web Services are a promising solution to an age-old need: fast and flexible information sharing among people and businesses. They represent the next phase of distributed computing, building on the shoulders of the previous distributed models. Web Services leverage the ubiquity of the Internet to link applications, systems, and resources within and...
Cloud computing is the deployment of software, platform and infrastructure as a service by a third-party provider to consumers on a pay-as-you-go basis with the opportunity of expanding and contracting their service requirements as needed. It allows business organizations to utilize models that allow them to focus more on competence which improves...
Abstract— Microprocessors are applicable to a wide range of information processing tasks, ranging from general computing to real-time monitoring systems. The microprocessor facilitates new ways of communication and how to make use of the vast information available online and offline both at home and in workplace. Most electronic devices--including...
Questions
Question (1)
What approach can be used to find empirical risk of a particular classifier in weka, for instance empirical risk minimization in logistic regression? I need the implementation of Empirical Risk Minimization on PART algorithm and logistic regression algorithm.
Thanks.
Projects
Projects (3)