Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Akeem Olowolayemo is active.

Publication


Featured researches published by Akeem Olowolayemo.


international conference on information and communication technology | 2010

Mobile user location determination using extreme learning machine

Teddy Mantoro; Akeem Olowolayemo; Sunday Olusanya Olatunji

There has been a rapid convergence to location based services for better resources management. This is made possible by rapid development and lower cost of mobile and handheld devices. Due to this widespread usage however, localization and positioning systems, especially indoor, have become increasingly important for resources management. This requires information devices to have context awareness and determination of current location of the users to adequately respond to the need at the time. There have been various approaches to location positioning to further improve mobile user location accuracy. In this work, we examine the location determination techniques by attempting to determine the location of mobile users taking advantage of signal strength (SS) and signal quality (SQ) history data and modeling the locations using extreme learning machine algorithm (ELM). The empirical results show that the proposed model based on the extreme learning algorithm outperforms k-Nearest Neighbor approaches.


International Journal of Pervasive Computing and Communications | 2011

Extreme learning machine for user location prediction in mobile environment

Teddy Mantoro; Akeem Olowolayemo; Sunday Olusanya Olatunji; Media Anugerah Ayu; Abu Osman Md Tap

Purpose – Prediction accuracies are usually affected by the techniques and devices used as well as the algorithms applied. This work aims to attempt to further devise a better positioning accuracy based on location fingerprinting taking advantage of two important mobile fingerprints, namely signal strength (SS) and signal quality (SQ) and subsequently building a model based on extreme learning machine (ELM), a new learning algorithm for single‐hidden‐layer neural networks.Design/methodology/approach – Prediction approach to location determination based on historical data has attracted a lot of attention in recent studies, the reason being that it offers the convenience of using previously accumulated location data to subsequently determine locations using predictive algorithms. There have been various approaches to location positioning to further improve mobile user location determination accuracy. This work examines the location determination techniques by attempting to determine the location of mobile u...


advances in mobile multimedia | 2009

Mobile user location prediction enabled services in ubiquitous computing: determination user location using MFN algorithm

Teddy Mantoro; Akeem Olowolayemo

The past decade has seen a rapid development of many applications in the field of pervasive or ubiquitous computing. This is made possible by rapid development in mobile and handheld devices. Due to this widespread usage however, localization and positioning systems, especially indoor, have become increasingly important for resources management. This entails information devices to have context awareness and prediction of current location of the users to adequately respond to the need at the time. In this work, we examine the location determination techniques by attempting to predict location of mobile users taking advantage of signal strength (SS) and signal quality (SQ).


international conference on information and communication technology | 2014

Social networks privacy policy awareness among undergraduate students: The case of Twitter

Shuhaili Talib; Nur Ain Ismail; Akeem Olowolayemo; Sharifah Aina Syed Naser; Siti Zalifah Haron; Asma Hanisah Mohammad Yusof

People nowadays freely give out their personal information on social media without knowing the implications of such actions. The proliferation of social networking sites creates the illusion of fun that made people to overlook the downsides of using these media. This paper examines the privacy awareness and general concerns of undergraduate students who form the bulk of users of these media. An evaluation of students has been carried out to assess their level of concern for privacy and how conscientious they are regarding privacy policies. The work also examines whether based on the awareness, users are more careful or generally carefree. Furthermore, the research also sought to evaluate whether the privacy policies as currently presented is adequate. Another objective of the research is to examine better ways of engaging users if the composition and presentation of privacy policies are found to be contributive to the low level engagement.


international conference on advanced computer science applications and technologies | 2013

Fuzzy Logic Based Compensated Wi-Fi Signal Strength for Indoor Positioning

Akeem Olowolayemo; Abu Osman Md Tap; Teddy Mantoro

Work in indoor positioning so far broadly relies on either signal propagation models or location fingerprinting. The former approach has inherent modelling complexity as a result of intervening walls and movement in the environment which, impacts the accuracy of such models. The latter approach on the other hand, is acclaimed to give better accuracy. However, for it to be used, an added overhead of surveying history data of a calibration of every indoor environment is required. Moreover, if any of the mobile Access Points (APs) included in the surveyed history data is down for any reason, the result of the location fingerprinting approach is impacted. This work proposes an indoor location determination approach that uses Fuzzy Weighted Aggregation of Received Signal Strengths (RSS) of Wi-Fi signals with Compensated Weighted Attenuation Factor (CWAF) in the form of fuzzy weighted signal quality and noise. The results are compared with locations away from APs with actual physical measurement in the environmental location to verify accuracy. The performance of the proposed algorithm shows that if the normalized weighted signal strength is properly compensated with weighted signal quality and noise, the approach offers a more computationally efficient positioning with adequate accuracy for indoor localization.


international conference on information and communication technology | 2010

Sensitivity to online privacy in social networking sites

Ikhlas Zamzami; Akeem Olowolayemo; Kazeem K. Bakare; Diallo Abdoulaye Kindy

Privacy has been a subject of discussion long before the advent of computer networks, however, the notion of privacy has taken a dramatic turn due to the proliferation of information technology tools and applications, which is further aggravated by the social networking sites which allow users to display their profile information to be viewed and shared by millions of online visitors. This gives the potential of negative use of their information. Previous works have concentrated largely on privacy in online transaction with just a few on the higher institution of learning, which is regarded as one of the earliest adopters of information technology and the most unsecured environments. This work examines the perception of online privacy among university students with the intention of examining the relationship between the demography, level of awareness and online privacy. The results show that despite there is no significant difference based on gender as well as whether the respondent is in IT related field or not, there is a contradiction between the level of awareness and expected attitude to online privacy.


international conference on information and communication technology | 2016

Security Failures in EMV Smart Card Payment Systems

Zubair Ahmad; Akram M. Zeki; Akeem Olowolayemo

New credit cards containing Europay, MasterCard and Visa (EMV) chips for enhanced security used in-store purchases rather than online purchases have been adopted considerably. EMV supposedly protects the payment cards in such a way that the computer chip in a card referred to as chip-and-pin cards generate a unique one time code each time the card is used. The one time code is designed such that if it is copied or stolen from the merchant system or from the system terminal cannot be used to create a counterfeit copy of that card or counterfeit chip of the transaction. However, in spite of this design, EMV technology is not entirely foolproof from failure. In this paper we discuss the issues, failures and fraudulent cases associated with EMV Chip-And-Card technology.


international conference on information and communication technology | 2014

Perception analysis of social networks' privacy policy: Instagram as a case study

Shuhaili Talib; Siti Munirah Abdul Razak; Akeem Olowolayemo; Melasari Salependi; Nur Fatihah Ahmad; Syakila Kunhamoo; Siti Khalijah Bani


international conference on information and communication technology | 2014

Linguistic approximations of distances for indoor location authority

Akeem Olowolayemo; Abu Osman Md Tap; Teddy Mantoro


international conference on data mining | 2016

Differential Qiraat Processing Applications using Spectrogram Voice Analysis

Muhammad Saiful Ridhwan; Akram M. Zeki; Akeem Olowolayemo

Collaboration


Dive into the Akeem Olowolayemo's collaboration.

Top Co-Authors

Avatar

Abu Osman Md Tap

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Teddy Mantoro

International University

View shared research outputs
Top Co-Authors

Avatar

Akram M. Zeki

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Shuhaili Talib

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Asma Hanisah Mohammad Yusof

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Diallo Abdoulaye Kindy

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Ikhlas Zamzami

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Kazeem K. Bakare

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Media Anugerah Ayu

International Islamic University Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge