Publication

Publisher:
 Http://www.mecs-press.net/ijwmt
Publication Type:
 Journal
Publication Title:
 Lecture Time Table Reminder System On Android Platform (Case Study: Final Year Students, Computer Science Department)
Publication Authors:
 1Ayeni Olaniyi Abiodun, 2Dada Olabisi, 3Talabi Olanrewaju
Year Published:
 2017
Abstract:
Forgetting the stipulated schedule or time of lectures due to one reason or the other has always been a major concern for students resulting in the students missing classes and thereby lagging behind in what the lecturer has taught the other students. The main purpose of developing the Lecture time table reminder system is to minimize this problem to an acceptable level. Lecture Timetable Reminder System is a mobile application developed on the Android platform for the students of Computer Science, 500level, Federal University of Technology, Akure, with the service of reminding them about their lectures. The major tools used in developing this application are Java, Eclipse, Android Software Development Kit (SDK), PHP and MySQL. Java is the programming language that was used and Eclipse is the Integrated Development Environment (IDE) and Android SDK is a virtual device emulator. Then PHP was used to produce a response customized for each user’s request to the application, MySQL is the database 
Publisher:
 International Journal Of Scientific & Engineering Research (IJSER)
Publication Type:
 Journal
Publication Title:
 Leveraging On E-Learning Platform For The Enhancement Of Computer Studies In High Schools
Publication Authors:
 Ayeni O.A, Abiola O. B. And Adeyemo O.A
Year Published:
 2014
Abstract:
These The teaching and learning of computer studies in high school in developing countries of the world will achieve a better result if the instrumentality of electronic learning is deployed. As the penetration of internet increases, accessibility to quality and relevant materials through e-learning platform will provide an alternative method to compliment the traditional way of teaching and learning. The target groups here are the high school students who are unable to attend classes because of scheduling, transportation problems or other restrictions. This means that from the comfort zones of each student, that is, from home, learning is made possible through a web based e-learning system. The fact that students only study abstract computer studies makes it difficult for them to be interested in the field of computer science. But with this project, there will be a lot of change; that is more secondary school students wanting to further their education in computer science. That is why the interface is easy to navigate and allows the user/learner to be in charge of the system. The design was done using PHP as the front end and MySQL as the back end 
Publisher:
 IJCA
Publication Type:
 Journal
Publication Title:
 Design And Implementation Of A Medium Interaction Honeypot
Publication Authors:
 Ayeni O.A, Alese B.K And Omotosho L.O
Year Published:
 2013
Abstract:
Security in computing world is a serious issue and must be handle with utmost care, hence the need to always protect and secure our networks as more and more business are been conducted through the internet. The expansion of the World Wide Web has given unlimited access to attackers to prey on ignorant administrator who lacks basic knowledge of network security. Vulnerabilities in common security components such as firewalls, security patches, access control and encryption are inevitable, so hackers take advantage of these loopholes to break into computer networks.This paper presents the result of a research that was carried out using a medium interaction honeypot, a virtual machine ware workstation, snort software and entropy-based model for capturing, analyzing and detection of malicious traffic targeted at the network. A ring topology network of three system was design using virtual machine work station, a Snort software was installed on all the three machine to capture traffic on the network and entropy-based mathematical analysis was conducted on the traffic to detect attack/malicious traffic. The entropy H(x) = – Pi ? Ni =1 log2(Pi) where Pi = Ni/S. N is a set of positive integer that represent the total number of server on the network, ni represent the size of the traffic in bytes and S represent the total length of the traffic that constitute the traffic. The result of the research work shows detection of malicious traffic and also limit the rate of denial of service targeted at the network 
Publisher:
 International Journal Of Engineering Research & Technology (IJERT)
Publication Type:
 Journal
Publication Title:
 Leveraging On Honeypot Technology To Improve Network Security
Publication Authors:
 Ayeni, O. A, Alese, B. K, Dada, O. M Aliyu, E. O
Year Published:
 2013
Abstract:
In this paper, a new framework is proposed for the design and implementation of decoy honeypot. In this research work, emphasis is laid on ways to improve network security by deploying honeypot technology. The design and configuration of a honeypot was implemented using a virtual machine(VM) ware workstation to detect attack or malicious traffic on a network. VM ware enables the creation, configuration, distribution, support and manages virtual machine similar to the one used on real computer system. Intrusion detection system (IDS), Entropy based detection scheme and Virtual machine (VM) ware work station were used to capture and analyse traffic over the network. The result shows that the deployment of an honeypot successfully fools an attacker to believe he is attacking a real system. Also, it shows that Honeypot can be deployed on a network to help in enhancing system security.