Publication

Publisher:
 International Institute For Science, Technology & Education Accelerating Global Knowledge Creation And Sharing
Publication Type:
 Journal
Publication Title:
 Protecting Legitimate Software Users
Publication Authors:
 Adu M. K., Alese B. K., Adewale O. S. And Adetunmbi A. O.
Year Published:
 2013
Abstract:

Nil

 
Publisher:
 International Journal Of Computer Applications
Publication Type:
 Journal
Publication Title:
 Development Of A Lattice-based Cryptosystem
Publication Authors:
 Anyanwu S. I., Alese B. K. And Obe O. O.
Year Published:
 2013
Abstract:
This work proposes a lattice-based cryptosystem using embedded technique of the closest vector problem (CVP). It adopts the key-gen algorithms of [1], and improves on vector reduction method for encryption/decryption. With this we achieved great implementation speed and time for an acceptable security parameter. 
Publisher:
 Anale. Seria Informatică
Publication Type:
 Journal
Publication Title:
 A Neuro-Fuzzy System For Detection During Interrogation In Law Enforcement Agency
Publication Authors:
 Iyare O., Alese B. K., Adewale O. And Falaki S.
Year Published:
 2013
Abstract:
The development of soft-computing approaches in law enforcement agencies has a wide range of application to intelligence analysis in the face of interrogation and evidence gathering during investigation. The capability of these tools to alleviate attempted deception by an informant or suspect is affected by many issues including the type of critical method, the type of hybridization used, and the ability to address issues of source reliability and information credibility. This work at the end will presents a hybrid model using neuro-fuzzy system to aid in the detection of deception during interrogation 
Publisher:
 Anale. Seria Informatică
Publication Type:
 Journal
Publication Title:
 Design Of Software Piracy Prevention Technique Using Mobile Agent Messaging Call
Publication Authors:
 Adu M. K., Alese B. K. And Adetunmbi A. O.
Year Published:
 2013
Abstract:
The rapid development of computer network especially the internet has enabled new software capabilities and wide market interest. The reality that this technology will virtually place all computer users on the internet is a major motivating factor in this work. This paper proposes a software piracy prevention technique in which client/user purchases a software product, but must connect to the remote server of the software developer before installation. The user provides an activation code that activates mobile agent. The validity of the activation is checked, the software user identity information is compared with store information in the database of the developer to ascertain authenticity and prevent piracy. A mathematical model is adopted for measuring the effectiveness of mobile agent migration in terms of network load which is expected to be at minimal 
Publisher:
 School Of Computing And Information Systems
Publication Type:
 Journal
Publication Title:
 Land Monitoring In Nigeria Using Geo-spatial Data Mining Approach.
Publication Authors:
 Thompson, A.F., Adetunmbi A. O. And Alese B. K.
Year Published:
 2013
Abstract:

Nil

 
Publisher:
 School Of Computing And Information Systems
Publication Type:
 Journal
Publication Title:
 School Of Computing And Information Systems
Publication Authors:
 Thompson, A.F., Adetunmbi A. O. And Alese B. K.
Year Published:
 2013
Abstract:

Nil

 
Publisher:
 International Journal Of Networks And Communications.
Publication Type:
 Journal
Publication Title:
 A Discriminatory Model Of Self And Nonself Network Traffic
Publication Authors:
 Adetunmbi A. O., Olubadeji Bukky, Alese B. K. And Adeola O. S.
Year Published:
 2013
Abstract:
The matrix of business and other transaction systems over the Internet makes computer security a critical issue in our day-to-day activities. In recent times, various approaches ranging from rule-based, expert system to data mining have been subjected to extensive research in handling security breaches on computer networks. Immune system (IS) presents a protection against the possibility of malfunctioning and failure of individual host cells. In mammals it keeps the organisms free of pathogens which are unfriendly foreign organisms, cells, or molecules. Two approaches to change detection which are based on the generation of T-cells were examined. One is an existing model while the other model is proposed by us, the one proposed by us is called immunological model, which is a protection model capable of autonomously detecting (Nonself) and opposing the attempts at intrusion and exploitation. The two models were implemented using C++ programming language and their feasibility determined on 1999 International Knowledge Discovery Intrusion Detection Datasets. The results reveal that our proposed model outperforms the existing model not only in terms of detection accuracy but also in terms of simplicity and generation of explainable rules inform of if ... then statements. The classification accuracy of our model christened IMSNT on training and test Datasets are 97.06% and 86.39% as against 89.65% and 85.70% on the Stephanie et al approach, which shows that it is a promising approach. The proposed system apart from its capability of detecting and monitoring the activities on the network can be used in extracting virus signature patterns. 
Publisher:
 International Journal Of Education And Research
Publication Type:
 Journal
Publication Title:
 Design Of A Neurofuzzy-based Model For Active And Collaborative Online Learning,
Publication Authors:
 Agbonifo, O. Catherine1*, Adewale, O. Sunday1 And Alese, B. Kayode
Year Published:
 2013
Abstract:
An e-learning model that adapts instructional content to individual learning differences and creates new assessment parameters such as studylevel, reviewstudylevel, collabotivelevel, assignments and finalexam for a focused and improved study performance is proposed in this paper. The model was adopted from Honey and Mumford model learning style questionnaire with four classes (activist, pragmatist, theorist and reflector) which was used to determine the learners’ learning preference and matched with the appropriate content presentation. Fuzzy c-means clustering technique was used to analyze the learners’ responses stored in the learner profile database to obtain the degree at which learners belong to each of the four classes. The highest degree of membership value was selected among the four classes as the most acceptable pattern of learning for individual learner. The result of the analysis showed classification accuracy in the ratio of 96%:4% on the fifty learners’ data collected. Furthermore, the learners’ responses from assessment parameters as they gainfully engaged with learning process were obtained in form of studylevel, reveiewstudylevel, collabotivelevel, assignments and finalexam and stored in leaner profile database. The values of the assessment parameters of each learner were fed into neurofuzzy-based network where fuzzy logic technique was performed on a four-layer network. The stages are fuzzification of the input variables, realization of fuzzy relations and rule evaluation, fuzzy aggregation of the rule outputs and defuzzification. These were used to determine the learners learning capability. The results obtained from the implementation of this model showed that the varied learning rate of 0.05, 0.10, 0.15 and 0.20 has the best network classification performance of 97% at 0.05. The tools used for the implementation of this model include MySQL, PHP, HTML and Java. 
Publisher:
 Annuls Computer Science Services (Romania)
Publication Type:
 Journal
Publication Title:
 Detecting DDOS Attack In An Agent-Based Virtual Knowledge Community.
Publication Authors:
 Ogunleye G. O., Adewale O. S. And Alese B. K.
Year Published:
 2013
Abstract:

Nil

 
Publisher:
 IMS Manthan International Journal Of Computer Science And Technology, India, Volume 6 Issue II
Publication Type:
 Journal
Publication Title:
 Computer Based Analysis Of Parents’ Contribution To The Productivity Of Public Secondary Schools In Nigeria
Publication Authors:
 Iwasokun G. B., Alese B. K. Aranuwa F. O. And Adegoke M. O. (2012)
Year Published:
 2012
Abstract:

Nil