Stephen Olatunde Olabiyisi

Stephen Olatunde Olabiyisi
  • B.Tech, M.Tech, M.Sc, Ph.D
  • Professor (Full) at Ladoke Akintola University of Technology

About

199
Publications
83,022
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
872
Citations
Current institution
Ladoke Akintola University of Technology
Current position
  • Professor (Full)
Additional affiliations
October 2013 - present
Ladoke Akintola University of Technology
Position
  • Professor (Full)
October 2010 - September 2013
Ladoke Akintola University of Technology
Position
  • Professor (Full)
October 2007 - September 2010
Ladoke Akintola University of Technology
Position
  • Professor (Associate)
Education
September 2003 - December 2005
Ladoke Akintola University of Technology
Field of study
  • Applied Mathematics
February 2002 - August 2003
University of Ibadan
Field of study
  • Computer Science
March 2000 - January 2002
Ladoke Akintola University of Technology
Field of study
  • Applied Mathematics

Publications

Publications (199)
Conference Paper
Full-text available
Patient healthcare service delivery system is essential to sustenance of lives of human being. Existing works modelled patient flow processes with emphasis on medical record sections and consultation rooms of hospital, thereby limiting the capability of the existing models in studying and improving the issues of outpatients’ long waiting time and q...
Article
Breast cancer detection faces challenges due to late diagnosis and inaccurate results, leading to improper treatment. Particle Swarm Optimization (PSO), a common optimization technique, often gets trapped in local optima, resulting in high false negatives and computational time. To address this, a study devised a modified PSO-based Back Propagation...
Article
Full-text available
Activation functions are an extremely important part of the artificial neural networks that are used to calculate weighted and biases and also to generate the outputs of neural network. However, selecting an appropriate activation transfer for a classification problem has been task faced by researchers. This paper presented an approach for evaluati...
Article
The need for cloud computing load balancing is a peculiar area of interest for researchers because it affects both the quality of service provided to users and resource utilisation on the part of cloud service providers. Due to the requirement to minimise processing costs, enhance throughput, improve resource efficiency, and optimise cloud node arr...
Article
Experimental development of a programming language that uses the lexicons of the Yoruba language has been attempted. This was done in the belief that an indigenous African language-based programming language would enhance the comprehension of computer-based problem-solving processes by indigenous students and teachers. However, the modern orthograp...
Conference Paper
Full-text available
The improvement of this paper takes advantage of the existing formal method called Stream XMachine by optimizing the theory and applying it to practice in a large-scale system. This optimized formal approach called Communicating Stream X-Machine (CSXM) applied in software testing based on its formal specifications to a distributed system as it poin...
Article
Full-text available
Classification is a crucial stage in identification systems, most specifically in biometric identification systems. A weak and inaccurate classification system may produce false identity, which in turn impacts negatively on delicate decisions. Decision making in biometric systems is done at the classification stage. Due to the importance of this st...
Article
Full-text available
This paper proposes to design a majority vote ensemble classifier for accurate detection of credit card frauds. There is a lack of research studies on analyzing real-world credit card data owing to the issues of confidentiality, some features were hidden. Credit Card Fraud Dataset from kaggle.com was used for this study. The dataset is made up of 2...
Article
Full-text available
The introduction of Artificial Intelligence technology enables the integration of Chatbot systems into various aspects of education. This technology is increasingly being used for educational purposes. Chatbot technology has the potential to provide quick and personalized services to everyone in the sector, including institutional employees and stu...
Chapter
Full-text available
Over the years, machine learning techniques have been exhaustively used to diagnose the presence of several diseases from medical images. This has achieved acceptable results which has resulted in the use of computer-aided design (CAD) systems as decision support systems for disease diagnosis. However, the best machine learning technique to use for...
Article
Full-text available
The design and prototype implementation of a subset of an African indigenous language-based programming language has been carried out and reported. In this study, an evaluation of the processor developed for the native language-based programming language was carried out in order to assess its level of conformance to the characteristics required of...
Article
Full-text available
Load balancing is a research area that seeks to improve the quality of services provided to various clients in cloud computing environments. As cloud users increase around the world, cloud service providers are challenged to develop strategies for distributing tasks to machines for processing at cloud data centers. This work collected and undertook...
Article
A complex interface can disorient the user in a mild situation while designing web-based application. Thus, measure should be taken to reduce the complexity and provide reasonable qualities (simplicity, generality and usability) to the user. This paper evaluates Interface Complexity Metric (ICM) between two xml schema languages: World Wide Web Cons...
Article
In this paper, we have proposed a novel deep learning-based underwater image dehazing method. The images taken under water are affected by light transportation properties like refraction, reflection, scattering, and absorption. Deep learning techniques give great results in the removal of haze in underwater degraded images. But the major challenge...
Article
Full-text available
p>Most of the existing high level programming languages havehitherto borrowed their lexical items from human languages including European and Asian languages. However, there is paucity of research information on programming languages developed with the lexicons of an African indigenous language. This research explored the design and implementation...
Article
Full-text available
span>Software testing is an activity to enable a system is bug free during execution process. The software bug prediction is one of the most encouraging exercises of the testing phase of the software improvement life cycle. In any case, in this paper, a framework was created to anticipate the modules that deformity inclined in order to be utilized...
Article
Full-text available
Grammar-checking is a concept of interest in many natural language environments. It typically involves the evaluation of the grammaticality of transmitted messages, be it written or verbal. Automated grammaticality evaluation is the examination of natural language text for grammatical accuracy using computer software. The current study examined dif...
Article
The concept of automated grammar evaluation of natural language texts is one that has attracted significant interests in the natural language processing community. It is the examination of natural language text for grammatical accuracy using computer software. The current work is a comparative study of different deep and shallow parsing techniques...
Article
Full-text available
Several criminal profiling systems have been developed to assist the Law Enforcement Agencies in solving crimes but the techniques employed in most of the systems lack the ability to cluster criminal based on their behavioral characteristics. This paper reviewed different clustering techniques used in criminal profiling and then selects one fuzzy c...
Article
Full-text available
Restaurant industry has become one of the most profitable industries in the world where incessant long waiting time may not only lead to customers’ dissatisfactions but also facilitate loosing of customers to other competitors. In this paper, in order to determine customers’ arrival patterns and service patterns which are critical factors in determ...
Article
Full-text available
Despite significant research efforts for School Timetabling Problem (STP) and other timetabling problems, an effective solution approach (model and algorithm) which provides boundless use and high quality solution has not been developed. Hence, this paper presents a novel solution approach for solving school timetabling problem which characterizes...
Article
Full-text available
School timetabling is an important operational problem in many high schools. It is a classical combinatorial optimization problem, proved to be NP-hard. For this reason, extensive research has been carried out on automated high school timetabling in the past 59 years. This research ranges from theoretical investigations and surveysto case studies i...
Article
Full-text available
School timetabling is an important operational problem in many high schools. It is a classical combinatorial optimization problem, proved to be NP-hard. For this reason, extensive research has been carried out on automated high school timetabling in the past 59 years. This research ranges from theoretical investigations and surveysto case studies...
Article
Full-text available
The development of an African native language-based programming language, using Yoruba as a case study, is envisioned. Programming languages based on the lexicons of indigenous African languages are rare to come by unlike those based on Asian and / or European languages. Availability of programming languages based on lexicons of African indigenous...
Article
Full-text available
The usage of ICT and availability of the internet facility has helped greatly on the increased of the potential of telemedicine applications, degree of speed, and methods on which herbal practitioners and patients can interact. The paper access adoption of ICT in herbal practice will enhance and facilitating timely information for better decision m...
Article
Measuring the complexity of software has been an insoluble problem in software engineering. Complexity measures can be used to predict critical information about testability of software system from automatic analysis of the source code. In this paper, Improved Cognitive Complexity Metric (ICCM) is applied on C programming language. Since C is a pro...
Article
Full-text available
Reconstruction Techniques are of great importance for reconstructing Low Resolution (LR) images to High Resolution (HR) images which are image reconstruction techniques constitute high image distortion which consequently increased their reconstruction error and reduced peak signal to noise ratio. This research developed a Disc Algebraic Back Projec...
Article
Full-text available
Boundary iterative-deepening depth-first search (BIDDFS) developed by [1] is used to allow searching from the starting node and the goal node simultaneously, yielding higher pathfinding efficiencies. It is based on the idea that faster pathfinding will result if the search expansions of a pathfinding algorithm is to be performed from both the start...
Article
Full-text available
Programming languages based on the lexicons of indigenous African languages are rare to come by unlike those based on Asian and / or European languages. It is opined that an African native language-based programming language would enhance comprehension of computer-based problem solving processes by indigenous students and teachers. This study inten...
Article
Full-text available
Aim: To develop a Curvelet Transform (CT)-Local Binary Pattern (LBP) feature extraction technique for mass detection and classification in digital mammograms. Study Design: A feature extraction technique. Place and Duration of Study: Sample: Department of Computer Science and Engineering LAUTECH, Ogbomoso, Nigeria 2016. Methodology: Three hundred (...
Article
Significant investments are being made yearly to improve service quality and delivery in banking systems to minimise customers' dissatisfactions with long waiting time due to overcrowding. However, most existing empirical studies to address this problem employed the method where the system was modelled and then developed a program that will simulat...
Conference Paper
Full-text available
This paper presents a comparison between Iterative Back Projection (IBP) and Discrete Algebraic Reconstruction Technique (DART). In this experiment, images were acquired using a digital camera of 5Mega Pixel (MP). A total of 50 images were used. The Images were degraded by introducing noise, blur and shift in angle. DART and IBP were used to recons...
Article
Full-text available
Uniformed search (also called blind search) is a technique that has no information about its domain and the only thing that it can do is to distinguish a non-goal state from a goal state. The efficiency of bidirectional, breadth first, depth first, iterative deepening and uniform cost search in terms of time taken, memory usage and number of nodes...
Article
Full-text available
Significant investments are being made yearly to improve service quality and delivery in banking systems to minimise customers' dissatisfactions with long waiting time due to overcrowding. However, most existing empirical studies to address this problem employed the method where the system was modelled and then developed a program that will simulat...
Article
Full-text available
Many face recognition algorithms perform poorly in real life surveillance scenarios because they were tested with datasets that are already biased with high quality images and certain ethnic or racial types. In this paper a black face surveillance camera (BFSC) database was described, which was collected from four low quality cameras and a professi...
Article
Today, as more and more families have working members, homes are being left unmonitored for several hours each day. There is no provision for emergency alerts, automation mechanisms or monitoring facilities for the home environment conditions. There is immense potential for technological development in this direction especially because of the advan...
Article
POWER FROM WALKING, looks weird But yes, we can produce power by simply strolling over. It is a wearable shoe, which is designed by which it has wireless interfacing with the embedded system, known as Smart Shoe. The standard is exceptionally simple, when you apply pressure on piezoelectric devices, electricity is generated over the gem grid. In th...
Article
Full-text available
Edge Detection is an ever-expanding frontier in the field of Digital Image Processing. Several research papers have been published in this domain in the past decade specifying many applications of edge detection methods using platforms like MATLAB or OpenCV like Hough, Canny, Sobel, Prewitt Trans- forms among many others. In this case study, variou...
Article
Full-text available
Pattern matching can be done with the help of bit-parallelism and character-based techniques. Bit-parallelism-based algorithms are currently the fastest and more efficient than other characterbased for both exact and inexact pattern matching. This is due to the use of intrinsic parallelism of the bit operation inside a computer word which allows yo...
Article
Full-text available
There exist several natural language processing systems that focus on checking the grammaticality (grammatical correctness or incorrectness) of natural language texts. Studies however showed that most existing systems do not assign specific scores to the grammaticality of the analysed text. Such scores would for instance prove very useful to second...
Article
Full-text available
Difficulties inherent in human face recognition from unconstrained and motion characterized scenes are usually accounted for due to varying illumination and pose of subjects in the scenes. However, a number of technical approaches have been developed to manage these nuisance factors to make recognition possible and optimal. In this paper, a review...
Article
Full-text available
Large variation in facial appearances of the same individual makes most baseline Aging-Invariant Face Recognition Systems (AI-FRS) suffer from high automatic misclassification of faces. However, some Aging-Invariant Feature Extraction Techniques (AI-FET) for AI-FRS are emerging to help achieve good recognition results when compared to some baseline...
Article
Full-text available
Authors' contributions This work was carried out in collaboration between all authors. Author ATT reviewed the existing works feature extraction techniques (texture based, shape based and intensity based). Author ATM reviewed different works of mass features (descriptors) used by different authors, feature extraction approaches and feature selectio...
Conference Paper
Full-text available
This study investigates the relative efficacy of using n-grams extracted terms, the aggregation of such terms, and a combination of feature extraction techniques in building an automated essay-type grading (AETG) system. The paper focused on the modification of the Principal Component Analysis (PCA) by integrating n-grams terms as input into the PC...
Conference Paper
Full-text available
Mobile agent is a software object that migrates through many nodes of a heterogeneous network of computers under its own control in order to perform task using resources of these nodes, during the past several years, mobile agent has received significant attention. Not only in the wide range of commercial and law enforcement applications, but also...
Article
Full-text available
Human faces undergo considerable amount of variations with aging. This variation being experienced in facial texture and shape with different ages of a particular subject makes recognition of faces very difficult. However, most existing Face Recognition Systems (FRS) suffer from high misclassification of faces because of the large variation in face...
Article
Full-text available
Cognitive informatics helps in comprehending the software characteristics and its complexity measures can be used to predict critical information about testability of software system. In this paper, a cognitive complexity metric for C++ programming language is formulated. Since C++ is an object – oriented language, the cognitive complexity metric i...
Article
Full-text available
Efficient e-learners activities model is essential for real time identifications and adaptive responses. Determining the most effective Neuro-Fuzzy model amidst plethora of techniques for structure and parameter identifications is a challenge. This paper illustrates the implication of system identification techniques on the performance of Adaptive...
Thesis
Full-text available
_______________________________________________________________________________ Abstract Feature extraction and feature selection place an important role in online character recognition and as procedure in choosing the relevant feature that yields minimum classification error. Character recognition has been a good research area for many years becau...
Article
Full-text available
Instructional design (ID) models are proven prescriptive techniques for qualitative lessons that could guarantee learning. Existing Learning Management Systems (LMS) miss-out the roles of this important quality control mechanism by providing a mere plane and passive platform for content authoring, thus becomes vulnerable for poor instructional desi...
Article
Full-text available
A mobile agent is a software entity that migrates from one host to another, performing data collection and software configuration tasks on behalf of users in distributed networks. However, studies have shown that the existing pull – all data strategy of mobile agent migration pattern moves data from one host to the next host along with the mobile a...
Article
Full-text available
This paper presents a recognition system for Yorùbá handwritten words using Hidden Markov Model(HMM).The work is divided into four stages, namely data acquisition, preprocessing, feature extraction and classification. Data were collected from adult indigenous writers and the scanned images were subjected to some level of preprocessing, such as: gre...
Article
Full-text available
Face recognition has been an active research area in the pattern recognition and computer vision domains due to its many potential applications in surveillance, credit cards, passport and security. However, the problem of correct method of partitioning the face data into train and test set has always been a challenge to the development of a robust...
Conference Paper
Full-text available
Many face recognition algorithms perform poorly in real life surveillance scenarios because they were tested with datasets that are already biased with high quality images and certain ethnic or racial types. In this paper a black face surveillance camera (BFSC) database was described, which was collected from four low quality cameras and a professi...
Article
Full-text available
Classification is the process of assigning a class to a group of objects. Moving objects classification can be difficult a task in the presence of dynamic factors like occlusion clutters and shadows. This paper developed a classifier for moving images (video stream) by using a modified adaptive background mixture model method. This system removes s...
Article
Full-text available
ABSTRACT Character Recognition has become an intensive research areas during the last few decades because of its potential applications. However, most existing classifiers used in recognizing handwritten online characters suffer from poor feature selection and slow convergence which affect training time and recognition accuracy. This paper proposed...
Conference Paper
Full-text available
Grammaticality is a concept within the fields of Natural Language Processing and Computational Linguistics that deals with the measure of grammatical correctness or incorrectness of a natural language expression. Among the methods employed for grammaticality evaluation, handcrafted grammar is the most precise. The major drawback of handcrafted gram...
Conference Paper
Full-text available
Grammaticality is a concept within the fields of Natural Language Processing and Computational Linguistics that deals with the measure of grammatical correctness or incorrectness of a natural language expression. Among the methods employed for grammaticality evaluation, handcrafted grammar is the most precise. The major drawback of handcrafted gram...
Article
Full-text available
Automated grading systems can reduce stress and time constraints faced by examiners especially where large numbers of students are enrolled. Essay-type grading involves a comparison of the textual content of a student's script with the marking guide of the examiner. In this paper, we focus on analyzing the n-gram text representation used in automat...
Article
Full-text available
Character Recognition has been one of the most intensive research during the last few decades because of its potential applications. However, most existing classifiers used in recognizing online handwritten characters suffer from poor feature selection and slow convergence which affect training time and recognition accuracy. Hence, this paper focus...
Research Proposal
Character Recognition has been one of the most intensive research during the last few decades because of its potential applications. However, most existing classifiers used in recognizing online handwritten characters suffer from poor feature selection and slow convergence which affect training time and recognition accuracy. Hence, this paper focus...
Research Proposal
Full-text available
Character Recognition has been one of the most intensive research during the last few decades because of its potential applications. However, most existing classifiers used in recognizing online handwritten characters suffer from poor feature selection and slow convergence which affect training time and recognition accuracy. Hence, this paper focus...
Article
Full-text available
This paper deals with the design and development of an electronic voting (e-voting) system with Global Positioning System (GPS) device for client service authentication and poll centre coordinates monitoring to solve the problem of identifying votes with their corresponding poll centres during and after voting exercise so that voters are assured th...
Article
Full-text available
Virtual patient (VP) systems are interactive computer simulations of real-life clinical scenarios for the purpose of medical training, education and assessment. There are limitations with the existing foreign VP systems which make them unsuitable for training indigenous Nigerian medical students. In this study, an Aboriginal Virtual Patient (AVP) s...
Thesis
Full-text available
Character Recognition has become an intensive research areas during the last few decades because of its potential applications. However, most existing classifiers used in recognizing handwritten online characters suffer from poor feature selection and slow convergence which affect training time and recognition accuracy. This paper proposed a method...
Article
Full-text available
In many countries, the adoption of Information and Communication Technology (ICT) in basic education has been continuously linked to higher efficiency, productivity, and educational outcomes, including quality of cognitive, creative and innovative thinking. This paper focuses on the development of an impact assessment algorithm for evaluating the a...
Article
Full-text available
Hospital deals with human lives, which are often at risk and where everything depends on quick response to diverse medical conditions. Thus, the need for efficient and effective management of patient care flow processes in a hospital is being one of the main leading goals in health sector.In this paper,a Timed Coloured Petri Nets (TCPN) formalism i...
Article
Full-text available
Feature dimensionality reduction is the process of minimizing the number of features in high dimensional feature space. It encompasses two vital approaches: feature extraction and feature selection. In face recognition domain, widely adopted face dimensionality reduction techniques include Principal component analysis, Discrete wavelet transform, L...
Article
Full-text available
This work presents a modified simulated annealing applied to the process of solving a typical high school timetabling problem. Preparation of a high school timetable consists basically of fixing a sequence of meetings between teachers and students in a prefixed period of time in such a way that a certain set of constraints of various types is satis...
Conference Paper
Full-text available
Biometric applications are faced with enormous performance challenges due to submission of low quality facial images. Previous research studies used only one property of the face or one feature within the recognition process to assess facial image quality, others employed expensive and cumbersome partial or no-reference subjective quality assessmen...
Article
Full-text available
Lecture timetabling is a very important process in any educational institutions. It is an open ended problem in which courses must be arranged around a set of timeslots and venues so that some constraints are satisfied. It constitutes a class of difficult-to-solve combinatorial optimization problems that lacks analytical solution methods. The main...
Article
Full-text available
The intent of this paper is to determine the extent to which fuzzy model could suitably modelled learner activities in E-learning system. However, the paucity of public dataset that meet the exact requirement of this work poses challenges, which necessitate dataset simulation. The detail approach used for the dataset simulation and the fuzzy model...
Article
Full-text available
The need to reduce the curse of dimensionality has spurred active research in the field of pattern recognition and machine learning. High dimensional data culminates in redundant as well as discriminant features. A vast amount of related literature offered the use of pattern classification methods such as Neural Network, Adaboost, Principal Compone...
Article
Full-text available
Mammography is an effective imaging modality used by radiologists for detection of breast cancer and effective suppression of pectoral muscle as well as removal of noise in form of artefacts aids accurate detection. In existing methods, either over-segmentation or under-segmentation, have been reported resulting in less accurate results. In this wo...
Data
This paper presents an integrated method to develop a Web-based Decision Support Systems (DSS) for prescription in herbal medicine. Review of existing research works in herbal medicine revealed that the potential of web platforms was exploited to aid herbal medicine survival. In light of this, an architectural framework of the proposed system was d...
Data
This paper presents an integrated method to develop a Web-based Decision Support Systems (DSS) for prescription in herbal medicine. Review of existing research works in herbal medicine revealed that the potential of web platforms was exploited to aid herbal medicine survival. In light of this, an architectural framework of the proposed system was d...

Network

Cited By