Browsing by Author "Agbele, Kehinde K."
Now showing 1 - 18 of 18
Results Per Page
Sort Options
Item Agent-based context-aware healthcare information retrieval using DROPT approach(International Science Press, 2012) Agbele, Kehinde K.; Adesina, Ademola Olusola; Daniel, Ekong; Seluwa, DeleAs the volume of information available on the Web information systems is growing continuously, browsing this content becomes a tedious task given the presentation of data that does meet user's aims and needs. In this paper, to satisfy user needs, an agent-based paradigm is an appropriate solution which gives outputs suitable to the user in the form of highly ranked documents. Conversely, patient care and a health condition commonly require collaboration between healthcare providers. The emergence of agent's technology motivates radical changes of how information is obtained. This paper addresses this problem by proposing a novel DROPT (Document Ranking OPTimization) measure for information retrieval results to validate the effectiveness of the information management tasks. We propose information retrieval system architecture, which main components are context aware agent’s technology to meet users' information needs.Item ANCAEE: A novel clustering algorithm for energy efficiency in wireless sensor networks(Scientific Research Publishing, 2011) Abidoye, Ademola P.; Azeez, Nureni A.; Adesina, Ademola Olusola; Agbele, Kehinde K.One of the major constraints of wireless sensor networks is limited energy available to sensor nodes because of the small size of the batteries they use as source of power. Clustering is one of the routing techniques that have been using to minimize sensor nodes’ energy consumption during operation. In this paper, A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks (ANCAEE) has been proposed. The algorithm achieves good performance in terms of minimizing energy consumption during data transmis-sion and energy consumptions are distributed uniformly among all nodes. ANCAEE uses a new method of clusters formation and election of cluster heads. The algorithm ensures that a node transmits its data to the cluster head with a single hop transmission and cluster heads forward their data to the base station with multi-hop transmissions. Simulation results show that our approach consumes less energy and effectively extends network utilization.Item Context-Aware Stemming algorithm for semantically related root words(Institute of Electrical and Electronics Engineers (IEEE) Inc., 2012) Agbele, Kehinde K.; Adesina, Ademola Olusola; Azeez, Nureni A.; Abidoye, Ademola P.There is a growing interest in the use of context-awareness as a technique for developing pervasive computing applications that are flexible and adaptable for users. In this context, however, information retrieval (IR) is often defined in terms of location and delivery of documents to a user to satisfy their information need. In most cases, morphological variants of words have similar semantic interpretations and can be considered as equivalent for the purpose of IR applications. Consequently, document indexing will also be more meaningful if semantically related root words are used instead of stems. The popular Porter’s stemmer was studied with the aim to produce intelligible stems. In this paper, we propose Context-Aware Stemming (CAS) algorithm, which is a modified version of the extensively used Porter’s stemmer. Considering only generated meaningful stemming words as the stemmer output, the results show that the modified algorithm significantly reduces the error rate of Porter’s algorithm from 76.7% to 6.7% without compromising the efficacy of Porter’s algorithm.Item A dependable model for attaining maximum authetication security procedure in a grid based environment(Academic Journals Inc., 2012) Azeez, Nureni A.; Abidoye, Ademola P.; Agbele, Kehinde K.; Adesina, Ademola OlusolaGrid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). Since this technology allows aggregation of various computer systems for usage by different users to run applications, the information stored on it which may be sensitive and private, remains vulnerable. According to related research on the attribute based access control for grid computing there is no adequate and appropriate security mechanism to authorize and authenticate users before accessing information on a grid system. The issue of security in grid technology has not been fully addressed even though it is a precondition for optimizing grid usability. Having realized the paucity of security guarantees, this research work focuses on developing a model for securing data and applications deployed on a grid on the basis of double identity authentication and public key. The implementation of the model has undoubtedly guaranteed the security of sensitive information on a grid vis-α-vis strict adherence to security policies and protocols.Item Digital watermarking: a state-of-the-art review(IIMC International Information Management Corporation, 2010) Adesina, Ademola Olusola; Nyongesa, Henry O.; Agbele, Kehinde K.Digital watermarking is the art of embedding data, called a watermark, into a multimedia object such that the watermark can be detected or extracted later without impairing the object. Concealment of secret messages inside a natural language, known as steganography, has been in existence as early as the 16th century. However, the increase in electronic/digital information transmission and distribution has resulted in the spread of watermarking from ordinary text to multimedia transmission. In this paper, we review various approaches and methods that have been used to conceal and preserve messages. Examples of real-world applications are also discussed.Item Engaging ICTs as a “Tool” for eHealth prioritization on human development and poverty reduction in the African region(Institute of Electrical and Electronics Engineers (IEEE) Inc., 2011) Agbele, Kehinde K.; Adesina, Ademola Olusola; Ekong, Daniel; Seluwa, DeleThe association connecting information and communication technologies (ICTs) and well-being or poverty remains vague and research today has resulted to divergent conclusions. This paper defines ICTs as “tools” that facilitate communication and the processing and transmission of information and the sharing of knowledge by electronic means. In the African region context, we examine ICTs utilization that aims to improve the provision, access and information management in the health sector. This paper considers access to information as very important benefits that can be achieved in many areas including economic growth, education and healthcare. In healthcare, the roles that ICT plays in ensuring that health information is provided to healthcare providers and consumers to support improving the health of individuals and strengthening health systems, disease detection and prevention are crucial to development and poverty reduction as stated in the UN’s MDGs. For example, access to appropriate information can minimise visits to physicians and periods of hospitalisation for patients suffering from chronic conditions, such as asthma, diabetes, hypertension and HIV/AIDS. This will in turn reduce the cost of healthcare provision. ICTs have the potential to impact almost every aspect of health sector. The paper then proposed how ICTs can be used to reduce poverty and ensure that health information is well administered and reaches the right people, at the right time and in the right form.Item Ensuring the security and privacy of information in mobile health-care communication systems(Academy of Science of South Africa, 2011) Adesina, Ademola Olusola; Agbele, Kehinde K.; Februarie, Ronald; Abidoye, Ademola P.; Nyongesa, Henry O.The sensitivity of health-care information and its accessibility via the Internet and mobile technology systems is a cause for concern in these modern times. The privacy, integrity and confidentiality of a patient’s data are key factors to be considered in the transmission of medical information for use by authorised health-care personnel. Mobile communication has enabled medical consultancy, treatment, drug administration and the provision of laboratory results to take place outside the hospital. With the implementation of electronic patient records and the Internet and Intranets, medical information sharing amongst relevant health-care providers was made possible. But the vital issue in this method of information sharing is security: the patient’s privacy, as well as the confidentiality and integrity of the health-care information system, should not be compromised. We examine various ways of ensuring the security and privacy of a patient’s electronic medical information in order to ensure the integrity and confidentiality of the information.Item Evaluating SMS parsing using automated testing software(Institute of Electrical and Electronics Engineers (IEEE) Inc., 2012) Adesina, Ademola Olusola; Agbele, Kehinde K.; Abidoye, Ademola P.; Azeez, Nureni A.Mobile phones are ubiquitous with millions of users acquiring them every day for personal, business and social usage or communication. Its enormous pervasiveness has created a great advantage for its use as a technological tool applicable to overcome the challenges of information dissemination regarding burning issues, advertisement, and health related matters. Short message services (SMS), an integral functional part of cell phones, can be turned into a major tool for accessing databases of information on HIV/AIDS as appreciable percentage of the youth embrace the technology. The common features by the users of the unique language are the un-grammatical structure, convenience of spelling, homophony of words and alphanumeric mix up of the arrangement of words. This proves it to be difficult to serve as query in the search engine architecture. In this work SMS query was used for information accessing in Frequently Asked Question FAQ system under a specified medical domain. Finally, when the developed system was measured in terms of proximity to the answer retrieved remarkable results were observed.Item ICT and information security perspectives in E-Health Systems(Medwell Journals, 2010) Agbele, Kehinde K.; Nyongesa, Henry O.; Adesina, Ademola OlusolaThis study examines issues pertinent to the rapidly evolving use of information as a currency of modern economies. Access to information has important benefits that can be achieved in many areas including, social-economic development, education and healthcare. In healthcare, for example, access to appropriate information can minimise visits to physicians and periods of hospitalisation for patients suffering from chronic conditions, such as asthma, diabetes, hypertension and HIV/AIDS. This will in turn reduce the cost of healthcare provision. This study examines theoretical and conceptual aspects of E-health as an ICT application area. Various definitions are presented in order to expound concepts associated with E-health. In the study, the links to a successful chain of trust to manage patient health records for E-health deployment are described. These are based on four technology pillars: identity management, asset management, data storage and information security. Practical solutions for integration of E-health with human, material and financial resources are explored.Item A novel approach integrating ranking functions discovery, optimization and infernce to improve retrieval performance(Medwell Journals, 2010) Agbele, Kehinde K.; Adesina, Ademola Olusola; Nyongesa, Henry O.; Febba, RonaldThe significant roles play by ranking function in the performance and success of Information Retrieval (IR) systems and search engines cannot be underestimated. Diverse ranking functions are available in IR literature. However, empirical studies show that ranking functions do not perform constantly well across different contexts (queries, collections, users). In this study, a novel three-stage integrated ranking framework is proposed for implementing discovering, optimizing and inference rankings used in IR systems. The first phase, discovery process is based on Genetic Programming (GP) approach which smartly combines structural and contents features in the documents while the second phase, optimization process is based on Genetic Algorithm (GA) which combines document retrieval scores of various well-known ranking functions. In the 3rd phase, Fuzzy inference proves as soft search constraints to be applied on documents. We demonstrate how these two features are combined to bring new tasks and processes within the three concept stages of integrated framework for effective IR.Item A novel document ranking algorithm that supports mobile healthcare information access effectiveness(Academic Journals Inc., 2011) Agbele, Kehinde K.; Adesina, Ademola Olusola; Azeez, Nureni A.; Abidoye, Ademola P.; Febba, RonaldThis study presented DROPT; an acronym for Document ranking Optmization algorithm approach, a new idea for the effectiveness of meaningful retrieval results from the information source. Proposed method extracted the frequency of query keyword terms that appears within the user context of Frequently Asked Questions (FAQ) systems on HIV/AIDS content related-documents. The SMS messages were analyzed and then classified, with the aim of constructing a corpus of SMS related to HIV/AIDS. This study presented a novel framework of Information Retrieval Systems (IRS) based on the proposed algorithm. The developed DROPT procedure was used as an evaluation measure. This “Term Frequency-Inverse Document Frequency (TFIDF)” method was applied to obtain the experimental result that was found promising in ranking documents not only the order in which the relevant documents were retrieved, but also both the terms of the relevant documents in feedback and the terms of the irrelevant documents in feedback might be useful for relevance feedback, especially to define its fitness function (mean weight).Item Peer-to-Peer Computing and Grid Computing: towards a better understanding(Akamai University, 2011) Azeez, Nureni A.; Abidoye, Ademola P.; Adesina, Ademola Olusola; Agbele, Kehinde K.; Iyamu, Tiko; Venter, Isabella M.Currently, both Peer-to-Peer Computing (P2P) and Grid Computing have remained the most vibrant and useful forms of distributed computing all over the world. Their applications are such that they cut across both academia and industry. It has come to the notice of researchers that there are great misunderstanding and misinterpretation on what these forms of distributed computing actually portend and stand for. In this paper therefore, we take a critical look at comparative study of both computing technologies with aim of making readers understand in a clear cut what each really stands for. To have a good comparison, we start by giving a well referenced definition of Grid Computing as well as Peer-to-Peer Computing. Also, we used technical issues and general features in our comparison vis-à-vis the architecture, security issue, data movement, application deployment, and operating system requirement. We also considered the strength of both distributed computing system and finally we considered what could be the future of both technologies.Item A query-based SMS translation in information access system(Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., 2011) Adesina, Ademola Olusola; Agbele, Kehinde K.; Azeez, Nureni A.; Abidoye, Ademola P.Mobile technology has contributed to the evolution of several media of communication such as chats, emails and short message service (SMS) text. This has significantly influenced the traditional standard way of expressing views from letter writing to a high-tech form of expression known as texting language. In this paper we investigated building a mobile information access system based on SMS queries. The difficulties with SMS communication were explored in terms of the informal communication passage and the associated difficulty in searching and retrieving results from an SMS-based web search engine under its non-standardization. The query is a pre-defined phrase-based translated English version of the SMS. The SMS machine tool normalization algorithm (SCORE) was invented for the query to interface with the best ranked and highly optimized results in the search engine. Our results, when compared with a number of open sources SMS translators gave a better and robust performance of translation of the normalized SMS.Item State-of-the-art review on relevance of genetic algorithm to internet web search(Hindawi Publishing Corporation, 2012) Agbele, Kehinde K.; Adesina, Ademola Olusola; Ekong, Daniel; Ayangekun, OluwafemiPeople use search engines to find information they desire with the aim that their information needs will be met. Information retrieval (IR) is a field that is concerned primarily with the searching and retrieving of information in the documents and also searching the search engine, online databases, and Internet. Genetic algorithms (GAs) are robust, efficient, and optimizated methods in a wide area of search problems motivated by Darwin’s principles of natural selection and survival of the fittest. This paper describes information retrieval systems (IRS) components. This paper looks at how GAs can be applied in the field of IR and specifically the relevance of genetic algorithms to internet web search. Finally, from the proposals surveyed it turns out that GA is applied to diverse problem fields of internet web search.Item Text Messaging a tool in e-Health services(Telkom, 2010) Adesina, Ademola Olusola; Agbele, Kehinde K.; Nyongesa, Henry O.HIV/AIDS continues to be a menace to the global community, especially in sub-Saharan Africa and South Africa is not an exception. The infection rate is continues to grow, in particular, among the young adults. Cell phones have been identified as one of the tools that can be used to overcome the challenge of information dissemination regarding HIV/AIDS among young adults because of its acceptability within this age group. Access to appropriate information can be a powerful for prevention and management of many chronic illnesses, including hypertension, diabetes and HIV/AIDS. Within the young adults age group information access by use of Short Messaging Services (SMS) becomes particularly appealing. In this regard, it is proposed to provide access to carefully screened information on HIV/AIDS within the context of frequently asked questions (FAQ) system. However, automating SMS-based information search and retrieval poses significant challenges because of the inherent noise in SMS communications. In the paper, a special corpus of SMS messages was collected based on a standardised question-answer collection. The SMS messages were then analysed, transcribed and classified, with the aim of building a dictionary of SMS-speak to English translations, with reference to HIV/AIDS.Item Threats to e-government implementation in the civil service: Nigeria as a case study(Akamai University, 2012) Azeez, Nureni A.; Abidoye, Ademola P.; Adesina, Ademola Olusola; Agbele, Kehinde K.; Oyewole, A.S.The rapid advancement in Information and Communication Technology (ICT) has undoubtedly influenced positive changes in carrying out administrative functions in government institutions. The ICT adoption rate in Africa is not impressive when compared to the more developed countries of the world. Nigeria, as a case study in this scenario, has also not implemented E-Government impressively, according to the required standards set up by the International Telecommunications Union (ITU). A comprehensive study conducted on the application and implementation of E-Government in Nigeria has provided some metrics that examine the stumbling blocks for realization of adequate and efficient E-Government implementation in the civil service. The research was carried out in the federal civil service in Nigeria in two phases namely, pre-IT implementation phase and post-IT implementation phase. Our findings reveal that ICT implementation will remain elusive in the civil service as long as the as threats explained below remain unaddressed. It has therefore been asserted that the need to overcome these threats is a precondition for realization of E-Government implementation in the federal civil service.Item UDCA: Energy optimization in wireless sensor networks using uniform distributed clustering algorithms(Academic Journals Inc., 2011) Abidoye, Ademola P.; Azeez, Nureni A.; Adesina, Ademola Olusola; Agbele, Kehinde K.Transceivers are the major energy consumption in a Wireless Sensor Network which is made of low-power, small in size, low cost and multi-functional nodes. These sensor nodes are operated by batteries which put significant constraint to the energy available to them. Each sensor node collects sensed data and forwards it to a single processing centre called the base station which uses all reported data to detect an event or determine the changes in an environment. In present study, we propose energy optimization in Wireless Sensor Networks (WSNs) using uniform distributed clustering algorithms. One of the algorithms distributes cluster heads uniformly in each cluster and each non-cluster head transmit its data to the cluster heads with short distance which reduces the communication distance of each node. Thus, minimizes the energy consumption of sensor nodes. The second algorithm generates cluster heads in hierarchical form in order to transmit the aggregate data to the base station. It was observed that there is increase in energy savings as we move from bottom up in the hierarchy. Both UDCA protocol and Low Energy Adaptive Cluster Hierarchy protocol (LEACH) were simulated. The simulation results show significant reduction in energy consumption of sensor nodes and cluster heads are more uniformly distributed among all nodes in UDCA compare with LEACH and extend the wireless sensor networks lifetime.Item Using wearable sensors for remote healthcare monitoring system(Scientific Research Publishing, 2011) Abidoye, Ademola P.; Azeez, Nureni A.; Adesina, Ademola Olusola; Agbele, Kehinde K.Recent technological advances in wireless communications and wireless sensor networks have enabled the design of low-cost, intelligent, tiny, and lightweight medical sensor nodes that can be strategically placed on human body, create a wireless body area network (WBAN) to monitor various physiological vital signs for a long period of time and providing real-time feedback to the user and medical staff. WBANs promise to re-volutionize health monitoring. In this paper, medical sensors were used to collect physiological data from patients and transmit it to Intelligent Personal digital Assistant (IPDA) using ZigBee/IEEE802.15.4 standard and to medical server using 3G communications. We introduced priority scheduling and data compression into the system to increase transmission rate of physiological critical signals which improve the bandwidth utilization. It also extends the life time of hand-held personal server by reducing power consumption during transmission.