Research Articles (Computer Science)
Permanent URI for this collection
The research papers in this collection represent the work of several projects.
Browse
Browsing by Author "Azeez, Nureni A."
Now showing 1 - 11 of 11
Results Per Page
Sort Options
Item ANCAEE: A novel clustering algorithm for energy efficiency in wireless sensor networks(Scientific Research Publishing, 2011) Abidoye, Ademola P.; Azeez, Nureni A.; Adesina, Ademola Olusola; Agbele, Kehinde K.One of the major constraints of wireless sensor networks is limited energy available to sensor nodes because of the small size of the batteries they use as source of power. Clustering is one of the routing techniques that have been using to minimize sensor nodes’ energy consumption during operation. In this paper, A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks (ANCAEE) has been proposed. The algorithm achieves good performance in terms of minimizing energy consumption during data transmis-sion and energy consumptions are distributed uniformly among all nodes. ANCAEE uses a new method of clusters formation and election of cluster heads. The algorithm ensures that a node transmits its data to the cluster head with a single hop transmission and cluster heads forward their data to the base station with multi-hop transmissions. Simulation results show that our approach consumes less energy and effectively extends network utilization.Item Context-Aware Stemming algorithm for semantically related root words(Institute of Electrical and Electronics Engineers (IEEE) Inc., 2012) Agbele, Kehinde K.; Adesina, Ademola Olusola; Azeez, Nureni A.; Abidoye, Ademola P.There is a growing interest in the use of context-awareness as a technique for developing pervasive computing applications that are flexible and adaptable for users. In this context, however, information retrieval (IR) is often defined in terms of location and delivery of documents to a user to satisfy their information need. In most cases, morphological variants of words have similar semantic interpretations and can be considered as equivalent for the purpose of IR applications. Consequently, document indexing will also be more meaningful if semantically related root words are used instead of stems. The popular Porter’s stemmer was studied with the aim to produce intelligible stems. In this paper, we propose Context-Aware Stemming (CAS) algorithm, which is a modified version of the extensively used Porter’s stemmer. Considering only generated meaningful stemming words as the stemmer output, the results show that the modified algorithm significantly reduces the error rate of Porter’s algorithm from 76.7% to 6.7% without compromising the efficacy of Porter’s algorithm.Item A dependable model for attaining maximum authetication security procedure in a grid based environment(Academic Journals Inc., 2012) Azeez, Nureni A.; Abidoye, Ademola P.; Agbele, Kehinde K.; Adesina, Ademola OlusolaGrid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). Since this technology allows aggregation of various computer systems for usage by different users to run applications, the information stored on it which may be sensitive and private, remains vulnerable. According to related research on the attribute based access control for grid computing there is no adequate and appropriate security mechanism to authorize and authenticate users before accessing information on a grid system. The issue of security in grid technology has not been fully addressed even though it is a precondition for optimizing grid usability. Having realized the paucity of security guarantees, this research work focuses on developing a model for securing data and applications deployed on a grid on the basis of double identity authentication and public key. The implementation of the model has undoubtedly guaranteed the security of sensitive information on a grid vis-α-vis strict adherence to security policies and protocols.Item Evaluating SMS parsing using automated testing software(Institute of Electrical and Electronics Engineers (IEEE) Inc., 2012) Adesina, Ademola Olusola; Agbele, Kehinde K.; Abidoye, Ademola P.; Azeez, Nureni A.Mobile phones are ubiquitous with millions of users acquiring them every day for personal, business and social usage or communication. Its enormous pervasiveness has created a great advantage for its use as a technological tool applicable to overcome the challenges of information dissemination regarding burning issues, advertisement, and health related matters. Short message services (SMS), an integral functional part of cell phones, can be turned into a major tool for accessing databases of information on HIV/AIDS as appreciable percentage of the youth embrace the technology. The common features by the users of the unique language are the un-grammatical structure, convenience of spelling, homophony of words and alphanumeric mix up of the arrangement of words. This proves it to be difficult to serve as query in the search engine architecture. In this work SMS query was used for information accessing in Frequently Asked Question FAQ system under a specified medical domain. Finally, when the developed system was measured in terms of proximity to the answer retrieved remarkable results were observed.Item A novel document ranking algorithm that supports mobile healthcare information access effectiveness(Academic Journals Inc., 2011) Agbele, Kehinde K.; Adesina, Ademola Olusola; Azeez, Nureni A.; Abidoye, Ademola P.; Febba, RonaldThis study presented DROPT; an acronym for Document ranking Optmization algorithm approach, a new idea for the effectiveness of meaningful retrieval results from the information source. Proposed method extracted the frequency of query keyword terms that appears within the user context of Frequently Asked Questions (FAQ) systems on HIV/AIDS content related-documents. The SMS messages were analyzed and then classified, with the aim of constructing a corpus of SMS related to HIV/AIDS. This study presented a novel framework of Information Retrieval Systems (IRS) based on the proposed algorithm. The developed DROPT procedure was used as an evaluation measure. This “Term Frequency-Inverse Document Frequency (TFIDF)” method was applied to obtain the experimental result that was found promising in ranking documents not only the order in which the relevant documents were retrieved, but also both the terms of the relevant documents in feedback and the terms of the irrelevant documents in feedback might be useful for relevance feedback, especially to define its fitness function (mean weight).Item Peer-to-Peer Computing and Grid Computing: towards a better understanding(Akamai University, 2011) Azeez, Nureni A.; Abidoye, Ademola P.; Adesina, Ademola Olusola; Agbele, Kehinde K.; Iyamu, Tiko; Venter, Isabella M.Currently, both Peer-to-Peer Computing (P2P) and Grid Computing have remained the most vibrant and useful forms of distributed computing all over the world. Their applications are such that they cut across both academia and industry. It has come to the notice of researchers that there are great misunderstanding and misinterpretation on what these forms of distributed computing actually portend and stand for. In this paper therefore, we take a critical look at comparative study of both computing technologies with aim of making readers understand in a clear cut what each really stands for. To have a good comparison, we start by giving a well referenced definition of Grid Computing as well as Peer-to-Peer Computing. Also, we used technical issues and general features in our comparison vis-à-vis the architecture, security issue, data movement, application deployment, and operating system requirement. We also considered the strength of both distributed computing system and finally we considered what could be the future of both technologies.Item A query-based SMS translation in information access system(Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., 2011) Adesina, Ademola Olusola; Agbele, Kehinde K.; Azeez, Nureni A.; Abidoye, Ademola P.Mobile technology has contributed to the evolution of several media of communication such as chats, emails and short message service (SMS) text. This has significantly influenced the traditional standard way of expressing views from letter writing to a high-tech form of expression known as texting language. In this paper we investigated building a mobile information access system based on SMS queries. The difficulties with SMS communication were explored in terms of the informal communication passage and the associated difficulty in searching and retrieving results from an SMS-based web search engine under its non-standardization. The query is a pre-defined phrase-based translated English version of the SMS. The SMS machine tool normalization algorithm (SCORE) was invented for the query to interface with the best ranked and highly optimized results in the search engine. Our results, when compared with a number of open sources SMS translators gave a better and robust performance of translation of the normalized SMS.Item Threats to e-government implementation in the civil service: Nigeria as a case study(Akamai University, 2012) Azeez, Nureni A.; Abidoye, Ademola P.; Adesina, Ademola Olusola; Agbele, Kehinde K.; Oyewole, A.S.The rapid advancement in Information and Communication Technology (ICT) has undoubtedly influenced positive changes in carrying out administrative functions in government institutions. The ICT adoption rate in Africa is not impressive when compared to the more developed countries of the world. Nigeria, as a case study in this scenario, has also not implemented E-Government impressively, according to the required standards set up by the International Telecommunications Union (ITU). A comprehensive study conducted on the application and implementation of E-Government in Nigeria has provided some metrics that examine the stumbling blocks for realization of adequate and efficient E-Government implementation in the civil service. The research was carried out in the federal civil service in Nigeria in two phases namely, pre-IT implementation phase and post-IT implementation phase. Our findings reveal that ICT implementation will remain elusive in the civil service as long as the as threats explained below remain unaddressed. It has therefore been asserted that the need to overcome these threats is a precondition for realization of E-Government implementation in the federal civil service.Item Towards ensuring scalability, interoperability and efficient access control in a multi-domain grid-based environment(South African Institute of Electrical Engineers, 2013) Azeez, Nureni A.; Venter, Isabella M.The application of grid computing has been hampered by three basic challenges: scalability, interoperability and efficient access control which need to be optimized before a full-scale adoption of grid computing can take place. To address these challenges, a novel architectural model was designed for a multi-domain grid based environment (built on three domains). It was modelled using the dynamic role-based access control. The architecture’s framework assumes that each domain has an independent local security monitoring unit and a central security monitoring unit that monitors security for the entire grid. The architecture was evaluated using the Grid Security Services Simulator, a meta-query language and Java Runtime Environment 1.7.0.5 for implementing the workflows that define the model’s task. In terms of scalability, the results show that as the number of grid nodes increases, the average turnaround time reduces, and thereby increases the number of service requesters (grid users) on the grid. Grid middleware integration across various domains as well as the appropriate handling of authentication and authorisation through a local security monitoring unit and a central security monitoring unit proved that the architecture is interoperable. Finally, a case study scenario used for access control across the domains shows the efficiency of the role based access control approach used for achieving appropriate access to resources. Based on the results obtained, the proposed framework has proved to be interoperable, scalable and efficiently suitable for enforcing access control within the parameters evaluated.Item UDCA: Energy optimization in wireless sensor networks using uniform distributed clustering algorithms(Academic Journals Inc., 2011) Abidoye, Ademola P.; Azeez, Nureni A.; Adesina, Ademola Olusola; Agbele, Kehinde K.Transceivers are the major energy consumption in a Wireless Sensor Network which is made of low-power, small in size, low cost and multi-functional nodes. These sensor nodes are operated by batteries which put significant constraint to the energy available to them. Each sensor node collects sensed data and forwards it to a single processing centre called the base station which uses all reported data to detect an event or determine the changes in an environment. In present study, we propose energy optimization in Wireless Sensor Networks (WSNs) using uniform distributed clustering algorithms. One of the algorithms distributes cluster heads uniformly in each cluster and each non-cluster head transmit its data to the cluster heads with short distance which reduces the communication distance of each node. Thus, minimizes the energy consumption of sensor nodes. The second algorithm generates cluster heads in hierarchical form in order to transmit the aggregate data to the base station. It was observed that there is increase in energy savings as we move from bottom up in the hierarchy. Both UDCA protocol and Low Energy Adaptive Cluster Hierarchy protocol (LEACH) were simulated. The simulation results show significant reduction in energy consumption of sensor nodes and cluster heads are more uniformly distributed among all nodes in UDCA compare with LEACH and extend the wireless sensor networks lifetime.Item Using wearable sensors for remote healthcare monitoring system(Scientific Research Publishing, 2011) Abidoye, Ademola P.; Azeez, Nureni A.; Adesina, Ademola Olusola; Agbele, Kehinde K.Recent technological advances in wireless communications and wireless sensor networks have enabled the design of low-cost, intelligent, tiny, and lightweight medical sensor nodes that can be strategically placed on human body, create a wireless body area network (WBAN) to monitor various physiological vital signs for a long period of time and providing real-time feedback to the user and medical staff. WBANs promise to re-volutionize health monitoring. In this paper, medical sensors were used to collect physiological data from patients and transmit it to Intelligent Personal digital Assistant (IPDA) using ZigBee/IEEE802.15.4 standard and to medical server using 3G communications. We introduced priority scheduling and data compression into the system to increase transmission rate of physiological critical signals which improve the bandwidth utilization. It also extends the life time of hand-held personal server by reducing power consumption during transmission.