Sururah Apinke Bello

Sururah Apinke Bello
  • Obafemi Awolowo University

About

31
Publications
23,097
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,738
Citations
Current institution
Obafemi Awolowo University

Publications

Publications (31)
Article
Full-text available
The idea of developing a system that can converse and understand human languages has been around since the 1200s. With the advancement in artificial intelligence (AI), Conversational AI came of age in 2010 with the launch of Apple's Siri. Conversational AI systems leveraged Natural Language Processing (NLP) to understand and converse with humans vi...
Article
Full-text available
The emergence of cryptocurrencies has drawn significant investment capital in recent years with an exponential increase in market capitalization and trade volume. However, the cryptocurrency market is highly volatile and burdened with substantial heterogeneous datasets characterized by complex interactions between predictors, which may be difficult...
Article
Concrete is a versatile construction material, but the water content can greatly influence its quality. However, using the trials and error method to determine the optimum water for the concrete mix results in poor quality concrete structures, which often end up in landfills as construction wastes, thus threatening environmental safety. This paper...
Article
Full-text available
Most existing identification and tackling of chaos in swarm drone missions focus on single drone scenarios. There is a need to assess the status of a system with multiple drones, hence, this research presents an on-the-fly chaotic behavior detection model for large numbers of flying drones using machine learning techniques. A succession of three Ar...
Article
Full-text available
This study developed a web-based text editor to eliminate the incompatibility of computer keyboard with the three major indigenous languages in Nigeria. It also aims to reduce the time taken to produce characters with diacriti-cal marks. The editors produced valid Unicode characters and require pressing less buttons to generating all the symbols of...
Article
Full-text available
Cloud computing technologies have revolutionised several industries for several years. Although the construction industry is well placed to leverage these technologies for competitive and operational advantage, the diffusion of the technologies in the industry follows a steep curve. This study therefore highlights the current contributions and use...
Article
Full-text available
The aim of this study is to develop a BIM-based Whole-life Performance Estimator (BWPE) for appraising the salvage performance of structural components of buildings right from the design stage. A review of the extant literature was carried out to identify factors that influence salvage performance of structural components of buildings during their...
Article
Full-text available
Cloud datacentres are large datacentres with thousands of servers that consume excessive energy and have significant carbon footprints. The increasing cloud users, on the other hand, are demanding more services with better response time. Hence, resources allocation, power management as well as better service delivery to users are challenging tasks...
Article
The aim of this paper is to identify Critical Success Factors (CSF) needed for effective material recovery through Design for Deconstruction (DfD). The research approach employed in this paper is based on a sequential exploratory mixed method strategy. After a thorough review of literature and conducting four Focus Group Discussion (FGDs), 43 DfD f...
Article
This study identifies evaluation criteria with the goal of appraising the performance of existing construction waste management tools and employing the results in the development of a holistic building information modelling (BIM) framework for construction waste management. Based on the literature, this paper identifies 32 construction waste manage...
Article
In recent times, construction industry is enduring pressure to take drastic steps to minimise waste. Waste intelligence advocates retrospective measures to manage waste after it is produced. Existing waste intelligence based waste management software are fundamentally limited and cannot facilitate stakeholders in controlling wasteful activities. Pa...
Article
The overall aim of this study is to develop a Building Information Modelling based Deconstructability Assessment Score (BIM-DAS) for determining the extent to which a building could be deconstructed right from the design stage. To achieve this, a review of extant literature was carried out to identify critical design principles influencing effectua...
Article
Cloud Computing's service models IaaS and PaaS have a number of proprietary pricing models as the services has been commoditized to some extent. The SaaS so far has been known with a flat price within the usage time. But pricing models need to be more flexible to prevent customers from thinking that paying same price for a service over a period is...
Article
A number of Cloud Providers have sprung up with different offers ranging from providing instances that looks much like physical hardware to application domain-specific offers. This study intends to propose a set of review criteria to evaluate existing Cloud computing providers to high level information about this emerging way of IT provisioning. Ex...
Article
Full-text available
The total reliance on internet connectivity and World Wide Web (WWW) based services is forcing many organizations to look for alternative solutions for providing adequate access and response time to the demand of their ever increasing users. A typical solution is to increase the bandwidth; this can be achieved with additional cost, but this solutio...
Article
Full-text available
The broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access to the wireless networks. The present 802.1× authentication scheme has some flaws, making mutual authentication impossible and open t...
Article
Cloud Computing's service models have a number of proprietary pricing models as the services has been commoditized to some extent. The SaaS especially so far has been known with a flat price within the usage time. Pricing models need to be more flexible to prevent customers from thinking that paying same price for a service over a period is no more...
Conference Paper
Full-text available
The task of Intrusion Detection Systems (IDS) in Wireless Sensors Networks (WSNs) is to monitor sensor network systems; detecting possible intrusions in the WSNs environment, alerting users after intrusions had been detected and reconfiguring the network if possible. In this study a Distributed IDS for WSNs was developed. Distributed IDS is impleme...
Article
Full-text available
Executive Summary This study presents a cost effective, reliable, and convenient mobile web-based system to facili-tate the dissemination of course information to students, to support interaction that goes beyond the classroom. The system employed the Really Simple Syndication (RSS) technology and was developed using Rapid Application Development (...
Article
In grid computing a loosely coupled and virtual computing infrastructure is created out of a collection of connected heterogeneous processors sharing various combinations of resources. It is pertinent to note that African Small and Medium Enterprises (SMEs) cannot participate in the global market using the current e-business solution due to the lac...
Article
Full-text available
Accurate and timely information is crucial to good health delivery system. This is necessary for medical personnel to effectively perform their life saving assignments. Nevertheless, accurate and timely information are far from many developing nations' health care delivery systems due to various shortcomings in their medical record departments. For...
Article
This paper presents the design of a computational model for Adire Making Process (AMP) in the context of discrete events theory. The model design is motivated by the need to explore the AMP with the aim to creating descriptions that can facilitate computationally implementable simulation and further experimentation. The model was achieved using mod...
Conference Paper
This paper presents the design of a computational model for Adire Making Process (AMP) in the context of discrete events theory. The model design is motivated by the need to explore the AMP with the aim to creating descriptions that can facilitate computationally implementable simulation and further experimentation. The model was achieved using mod...
Conference Paper
This study developed a modification to the selective repeat automatic repeat request (ARQ) error control scheme with a view to reducing the delay involved in the reordering of the misordered data in data communication networks. The proposed scheme tagged "pointer based selective repeat" (PBSR) consisted of transmission, retransmission and resequenc...
Article
Full-text available
Today, increasingly complex control problems abound, for which mathematical modelling representations may be difficult to obtain. This study relied on the reported strength of the fuzzy logic technique in controlling highly nonlinear systems to improve the user perceived Quality of Service (QoS) of the web application. The fuzzy logic based QoS bro...

Network

Cited By