Olusegun Folorunso
Federal University of Agriculture, Abeokuta
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Olusegun Folorunso.
InSITE 2009: Informing Science + IT Education Conference | 2009
Olufunke R. Vincent; Olusegun Folorunso
Image edge detection is a process of locating the e dge of an image which is important in finding the approximate absolute gradient magnitude at each point I of an input grayscale image. The problem of getting an appropriate absolute gradient magnitude for edges lies in the method used. The Sobel operator performs a 2-D spatial gradient measurement on images. Transferring a 2-D pixel array into statistically uncorrelated data se t enhances the removal of redundant data, as a result, reduction of the amount of data is required to represent a digital image. The Sobel edge detector uses a pair of 3 x 3 convolution masks, one estimating gradient in the x-direction and the other estimating gradient in y‐direction. The Sobel detector is incredibly sensit ive to noise in pictures, it effectively highlight them as edges. Henc e, Sobel operator is recommended in massive data communication found in data transfer.
Information Management & Computer Security | 2006
Olusegun Folorunso; Oluwafemi S. Ogunseye; Sushil K. Sharma
Purpose – Education delivery via electronic media is becoming relevant in Nigeria educational systems, especially the universities. In spite of this, there are hindrances affecting the total acceptability of this technology.Design/methodology/approach – In this paper, we investigated these critical factors by analyzing the questionnaires collected from three sampled universities in Nigeria: private, public and state owned universities.Findings – The results obtained indicated that mass unawareness, low computer literacy level and cost were identified as the critical factors affecting the acceptability of the technology.Originality/value – Analysis herein has shown the factors affecting the acceptability of e‐learning in Nigeria. The results obtained will assist policy makers by finding solutions to literacy problems in Nigeria.
Information Management & Computer Security | 2007
Olusegun Folorunso; Olufunke R. Vincent; B. M. Dansu
Purpose – This paper seeks to describe the use of edge‐detection as an approach to support the process of analyzing visual scenes.Design/methodology/approach – Edges‐detection is considered as a KM technique task. Several edge‐detection algorithms were discussed but Canny method was chosen in conjunction with JAVA to find the edges of an image.Findings – The paper provides an overview of knowledge need by the visual scene analyst. It reviews the process of extracting knowledge from image data. Finally, the paper looks at the management aspects of image‐edge detection.Originality/value – Experiments herein have proved the method robustness by considering edge‐detection as a knowledge management technique for visual scene analysis by deriving knowledge from semantic information based on object boundaries shadow.
Information Management & Computer Security | 2005
Olusegun Folorunso; Adewale Akintayo Ogunde
Purpose – Business process redesign (BPR) is undertaken to achieve order‐of‐magnitude improvements over “old” forms of the organization. Practitioners in academia and the business world have developed a number of methodologies to support this competitive restructuring that forms the current focus of concern, many of which have not been successful. The purpose of this paper is to suggest the use of data mining (DM) as a technique to support the process of redesigning a business by extracting the much needed knowledge hidden in large volumes of data maintained by the organization through the DM models.Design/methodology/approach – The paper explains how the DM/BPR tool will extract and transfer the much‐needed knowledge necessary for implementing the new business.Findings – The process of extracting knowledge hidden from large volumes of data (DM) has proved very successful in solving many business or scientific problems to achieve competitive advantage. As suggested in the DM/BPR framework, the DM model ca...
Electronic Commerce Research | 2010
Olufunke R. Vincent; Olusegun Folorunso; Ayodele Akinde
The use of e-commerce has been associated with a lot of skepticism and apprehension due to some crimes associated with e-commerce and specifically to payment systems. The secure socket layer (SSL) protocol is trusted in this regard to secure transactions for sensitive applications like e-commerce. Unfortunately, the use of SSL protocol causes slow response time on the server which is a major cause of frustration for on-line shoppers. In this paper, we propose a secured credit-debit card payment systems based on Elliptic Curve Cryptosystem (ECC). We first examined ECC algorithm over prime fields GF(p), implement our proposed method using a typical transaction involving credit/debit card numbers and compared the performance with RSA cryptosystem. Our result shows that ECC is faster in terms of response to transaction request and occupies less memory space than equivalent RSA system. Thus, these makes it more suitable public Key cryptography scheme for application in a constraint open environment like payment system where fast operations are needed.
Data Science Journal | 2008
Olusegun Folorunso; Shawn Oluwafemi Ogunseye
This research investigates the applicability of Daviss Technology Acceptance Model (TAM) to agriculturists acceptance of a knowledge management system (KMS), developed by the authors. It is called AGROWIT. Although the authors used previous Technology Acceptance Model user acceptance research as a basis for investigation of user acceptance of AGROWIT, the model had to be extended and constructs from the Triandis model that were added increased the predictive results of the TAM, but only slightly. Relationships among primary TAM constructs used are in substantive agreement with those characteristic of previous TAM research. Significant positive relationships between perceived usefulness, ease of use, and system usage were consistent with previous TAM research. The observed mediating role of perceived usefulness in the relationship between ease of use and usage was also in consonance with earlier findings. The findings are significant because they suggest that the considerable body of previous TAM-related information technology research may be usefully applied to the knowledge management domain to promote further investigation of factors affecting the acceptance and usage of knowledge management information systems such as AGROWIT by farmers, extension workers, and agriculture researchers.
Computer and Information Science | 2010
Olusegun Folorunso; Oluwatobi O. Akande; Adewale Opeoluwa Ogunde; Olufunke R. Vincent
The study examined the detection of attacks against computer networks, which is becoming a harder problem to solve in the field of Network security. A problem with current intrusion detection systems is that they have many false positive and false negative events. Most of the existing Intrusion detection systems implemented depend on rule-based expert systems where new attacks are not detectable. In this study, optimization algorithms were added to intrusion detection system to make them more efficient. Self Organizing Migrating Genetic Algorithm (SOMGA) was integrated into intrusion detection system to obtain a more efficient intrusion detection system called ID-SOMGA. This study provides an equally efficient method to implement an intrusion detection system that returns very low false positives. Due to the complexities involved in security issues, and the implementation of the work, selected values of the network log was used to implement the system in order to reduce some of these complexities. The Self Organizing Migrating Genetic Algorithm – Intrusion Detection System was tested and values of the result were compared with that of an IDS with Genetic Algorithm Intrusion Detection System. In terms of detection rates, ID-SOMGA was found to be slower than an IDS with GA, the false positives in ID-SOMGA was lower than what obtains with genetic algorithm. Both schemes were able to identify new patterns almost in the same way. The ID-SOMGA system that was developed improved the security of systems in networked settings allowing for confidentiality, integrity and availability of system resources.
Communications and Network | 2011
Kolawole I. Oyeyinka; Ayodeji Oludola Oluwatope; Adio T. Akinwale; Olusegun Folorunso; Ganiyu A. Aderounmu; Olatunde O. Abiona
Transmission control protocol (TCP) has undergone several transformations. Several proposals have been put forward to change the mechanisms of TCP congestion control to improve its performance. A line of research tends to reduce speed in the face of congestion thereby penalizing itself. In this group are the window based congestion control algorithms that use the size of congestion window to determine transmission speed. The two main algorithm of window based congestion control are the congestion avoidance and the slow start. The aim of this study is to survey the various modifications of window based congestion control. Much work has been done on congestion avoidance hence specific attention is placed on the slow start in order to motivate a new direction of research in network utility maximization. Mathematical modeling of the internet is discussed and proposals to improve TCP startup were reviewed. There are three lines of research on the improvement of slow start. A group uses the estimation of certain parameters to determine initial speed. The second group uses bandwidth estimation while the last group uses explicit request for network assistance to determine initial startup speed. The problems of each proposal are analyzed and a multiple startup for TCP is proposed. Multiple startups for TCP specify that startup speed is selectable from an n-arry set of algorithms. We then introduced the e-speed start which uses the prevailing network condition to determine a suitable starting speed.
Kybernetes | 2008
Olusegun Folorunso; Oluwafemi S. Ogunseye
Purpose – The need for maximum cognition from massive amounts of data is becoming explosive. Different visualization mechanisms are being introduced to achieve this aim. This paper aims to consider the state of organizations as regards being abreast with the recent visualization technologies.Design/methodology/approach – In this paper, the authors look critically at the system adoption life cycle as it applied to visualization system. Also, the two forms of visualization; static and dynamic are looked at, considering the least applied and why. An evaluation of the visualization system was implemented in order to discern if it provides any benefit to organizations.Findings – The study showed that the RT‐DANGO tool when compared to result from Excel exposed some spikes at some points when visualized dynamically which are not observed using usual static graph as it exposed some unseen events. The mean time taken to finish analysis of 4,000 concurrent‐related data were 168 s using RT‐DANGO and 121 s with the ...
Campus-wide Information Systems | 2010
Olusegun Folorunso; AdioTaofeek Akinwale
Purpose – In tertiary institution, some students find it hard to learn database design theory, in particular, database normalization. The purpose of this paper is to develop a visualization tool to give students an interactive hands‐on experience in database normalization process.Design/methodology/approach – The model‐view‐controller architecture is used to alleviate the black box syndrome associated with the study of algorithm behavior for database normalization process. The authors propose a visualization “exploratory” tool that assists the learners in understanding the actual behavior of the database normalization algorithms of choice and also in evaluating the validity/quality of the algorithm. This paper describes the visualization tool and its effectiveness in teaching and learning normalization forms and their functional dependencies.Findings – The effectiveness of the tool has been evaluated in surveys. It shows that students generally viewed the tool more positively than the textbook technique. ...