@futminna.edu.ng
Lecturer, Department of Computer Science, School of ICT
Federal University of Technology Minna
HCI
Usability
Accessibility
Multi-criteria decision making
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
Solomon Adelowo Adepoju, Oluwaseun Adeniyi Ojerinde, and Eugene Aigbogun Osaretin
Springer Nature Switzerland
Opeyemi Aderike Abisoye, Abdullahi Bala, Solomon Adelowo Adepoju, Oluwaseun Adeniyi Ojerinde, and John Kolo Alhassan
Springer Nature Switzerland
Haruna Atabo Christopher, Joseph Adebayo Ojeniyi, Solomon Adelowo Adepoju, and Opeyemi Aderike Abisoye
IEEE
Cloud computing is an emerging technology that provides services and computing resources on demand to users with less management effort through the internet. Because of the increase in the number of internet user and the distributed nature of cloud, it has become a platform for criminal activities from within and outside of cloud environment. The cloud based intrusion detection system has been found as the most effective security mechanism to prevent intruders from accessing cloud resources. This research has put forward a cloud based Intrusion Detection System that detects criminal behaviors inside cloud, utilizing Antlion Optimization (ALO) as the feature selection algorithm and Support Vector Machine as the Classification algorithm. Results from experiments shows its accuracy to be 98.56%,2.29% False Positive Rate, 96.32% (Recall, Precision and F-Measure), and 92.52% Kappa Statistics.
Hafiz Olalekan Salau, Opeyemi Adenike Abisoye, Ishaq Oyebisi Oyefolahan, and Solomon Adelowo Adepoju
IEEE
Several alarming health challenges are urging medical experts and practitioners to research and develop new approaches to diagnose, detect and control the early spread of deadly diseases. One of the most challenging is Coronavirus Infection (Covid-19). Models have been proposed to detect and diagnose early infection of the virus to attain proper precautions against the Covid-19 virus. However, some researchers adopt parameter optimization to attain better accuracy on the Chest X-ray images of covid-19 and other related diseases. Hence, this research work adopts a hybridized cascaded feature extraction technique (Local Binary Pattern LBP and Histogram of Oriented Gradients HOG) and Convolutional Neural Network (CNN) for the deep learning classification model. The merging of LBP and HOG feature extraction significantly improved the performance level of the deep-learning CNN classifier. As a result, 95% accuracy, 92% precision, and 93% recall are attained by the proposed model.
Abbas Nna Halima, Mohammed Danlami Abdulmalik, Solomon Adelowo Adepoju, and Enesi Femi Aminu
IEEE
Recently digital watermarking techniques played an essential role in protecting and authenticating the copyright of multimedia content in a cloud. Based on the literature, there are several digital watermarking techniques used for data protection in cloud computing. However, each of these techniques has its own limitations such as high levels of piracy, theft, and unauthorized distribution of multimedia content. This Survey employs a content-based analysis approach to investigate the watermarking techniques that are more secure, imperceptible, and robust against various kinds of multimedia attacks. The survey shows that the hybridization of watermarking techniques and feature descriptors is more efficient in comparison to a single watermarking technique. This research work concludes that the hybridization technique and use of descriptors are more secure.
Ibrahim Hadiza Ndanusa, Solomon Adelowo Adepoju, and Adeniyi Oluwaseun Ojerinde
IEEE
Considering the growth of the credit businesses, machine learning models for granting loan permissions with the minimum amount of risk are becoming increasingly popular among banking sectors. Machine Learning based models has proven to be useful in resolving a variety of banking risk prediction issues. ML Predictions are sometimes unfair and biased because they are heavily dependent on randomly selected training data sample for every prediction made. However, this problem can be address by utilizing a cross-validation strategy. Prediction can be improved by combining decisions from different machine learning algorithms (ensemble decision making). The proposed consensus-based prediction model is evaluated using standard performance metrics, and the proposed model achieved an accuracy of 83 percent.
Haruna I Adamu, A. Mohammed, Solomon Adelowo Adepoju and Abisoye Opeyemi Aderiike
Text passwords are the most extensively used technique of computer authentication. This approach has been found to have several flaws. Users, for example, typically select passwords that are simple to guess. A difficult-to-guess password, on the other hand, is also difficult-to-remember. Textual passwords are vulnerable to brute-force and keylogger attacks. Graphic passwords have been proposed in the literature as a possible replacement for alphanumerical passwords, based on the assumption that people remember pictures better than text. Existing graphical passwords, on the other hand, are vulnerable to a shoulder surfing assault. To solve these security flaws, this paper proposes an authentication method for online applications that uses a combination of one-time passwords, textual, and graphical passwords. The efficacy of the recommended solution was confirmed by usability testing and security analysis procedures. A total of thirty participants took part in the system evaluation. The security assessment found that the proposed system meets all its primary security requirements. The proposed system was found to be simple to use, friendly, and secure throughout the usability test. When compared to traditional authentication solutions, this study exhibited greater usability and security.
Emeka Nwokedi, Oluwaseun Adeniyi Ojerinde, Joseph Ojeniyi, and Solomon Adepoju
ACM
With the evolution of cryptography in the twentieth century, classical ciphers (transposition ciphers) are gradually being pushed out because it now possesses low security ratings, however we can still salvage them, as they have other desirable and admirable qualities which include: easy of design, medium technical know-how and low computational power and it is to achieve this that this study; “A three layer permutation Cryptosystem using a modification of Transposition cipher and two layers content permutation for Wills” was carried out . The aim of this study is to make columnar transposition more secure and relevant so that companies with low technology budget and know-how be secured from known cryptosystem attack. The method used to achieve the above aim is adding to columnar transposition the technique of rail cipher, this affected the sequence of transposition, and lead to a new encryption equation and function. Cryptanalysis was carried out using various tools (Cryptool 2, Dcode and Countwordsfree) and parameters, using a transposition decoder the cipher text gotten using the traditional transposition cryptosystem decrypted with a hundred percent word and character accuracy whilst using the improved system gave a thirty percent accuracy.
Salako E. Adekunle and Solomon Adelowo Adepoju
IGI Global
Humans are facing complex problems such as learning how to solve computational problems and academic failures. This research focused on the impact assessment of collaborative learning strategy on solving computational problems among students in Nigeria. A mixed research design was used and the population was 1600 senior secondary school students. A stratified random sampling method was used to select 240 SS III students for the study. The mathematics and computer programming performance tests instrument for data collection were validated by experts in educational measurement and evaluation. A reliability coefficient of 0.79 was obtained for the test instrument. The data collected were analysed using mean, standard deviations and multivariate analysis of covariance (MANCOVA) statistical tools. Findings revealed that the use of collaborative learning strategy was effective on student's academic performance in solving mathematical and programmatically based problems. Recommendations on students' learning activities were suggested for the enhancement of students' learning experiences.
Solomon Adelowo Adepoju, Ishaq Oyebisi Oyefolahan, Muhammed Bashir Abdullahi, and Adamu Alhaji Mohammed
UUM Press, Universiti Utara Malaysia
Solomon Adelowo Adepoju, Ayobami Ekundayo, Adeniyi Oluwaseun Ojerinde, and Rofiat Ahmed
IEEE
Usability and accessibility of websites have been a subject of great importance to human computer interaction researchers. Hence, this paper carries out the usability and accessibility evaluation of the four main Nigeria mobile network operators’ websites. The websites tested are: www.mtnonline.com, www.gloworld.com, www.ng.airtel.com, and www.9mobile.com.ng. Four online automated tools were used which are: Mobile SEO, WAVE, TAW and Achecker. User testing was also conducted in a controlled environment with forty participants who were given five tasks to perform on the websites. The activities of the participants were recorded using Camtasia studio to get the total time taken to complete the task. Questionnaire for Interaction Satisfaction (QUIS) was used to get users feedback on the tested websites. The QUIS was designed based on five categories with each category dealing with an aspect of usability. The results show that the overall usability level of MTN was the best among the four. This was followed by GLO, 9mobile and Airtel respectively. From the results obtained, it is recommended that the web designers of the mobile network operators compare their website design with web content accessibility guideline (WCAG 2.0) to make sure the different categories of subscribers are satisfied with the features and services provided by the websites.
Victor Ndako Adama, Ibrahim Shehi Shehu, Solomon Adelowo Adepojur, and A. Fatima Sulayman
Springer International Publishing
Technology has constantly evolved, leading to the invention and manufacturing of enhanced electronic and ICT devices. This has fueled the desire for people, companies and organizations to continuously upgrade their electronic and ICT infrastructure. Basically the circulation of these devices is on the increase. However, if new devices continuously replace existing ones, what happens to the ones replaced? Where do they go? How are they managed today? Unfortunately, these old devices end up in under developed and developing countries as “Tokumbos” (second hand, handed down), cheap alternatives. Such countries clearly lack the technology and technical know-how to appropriately recycle or dispose of them when they break down and become irreparable. They then end up as electronic waste (e-waste) not properly managed. Local disposal techniques employed by scavengers in such countries lead to consequences detrimental to the environment, the economy, ecology and lives of their people. This paper looks into the lingering problem of e-waste in Nigeria. It traces its source, reviews its negative impacts and via a comparatives study on countries that have good waste management practices, vis-a-vis efforts so far by the Nigerian government, seeks to suggest how to improve on the countries e-waste management strategies.
Victor Ndako Adama, Ibrahim Shehi Shehu, Solomon Adelowo Adepoju, and Rasheed Gbenga Jimoh
Springer International Publishing
A lot has gone into research aimed at establishing design guidelines to guide developers in developing mobile applications usable by low literate and novice users due to their technological inclination. However, despite quite a number of valuable usability constraints unveiled, corresponding recommendations made and a list of synthesized design guidelines established across various research works, those guidelines are still incomplete and not standardized. In a similar context, the World Wide Web Consortium (W3C), an international standards organization for the World Wide Web, has addressed a similar problem for web based applications. They developed a set of standard guidelines called Web Content Accessibility Guidelines (WCAG 2.0) that specifies how web content can be made more accessible to all types of user on the World Wide Web. The existence of such standard for mobile phones application would greatly impact mobile application development for such users. However none of such standards as WCAG exists for mobile applications development. It has been established that more effort is needed towards uncovering more low literate and novice user centered usability constrains with corresponding recommendations. Thus there exists the need in this research area towards achieving a set of standard guidelines for the development of mobile applications. This study aim to achieve four (4) objectives: i. to explore for low literate or novice user centered usability constraints in mobile applications and their associated design recommendations from existing literatures. ii. to build a mobile banking prototype based on design recommendations from existing literatures. iii. to perform empirical test on some selected banking applications against the developed prototype. iv. to evaluate (comparative analysis) of objective (iii.) aimed at exposing more novice user centered usability constraints using System Usability Scale (SUS) tool. Levels of significance were tested via a two sampled t-test for mean.
S. A. Adepoju and I. S. Shehu
IEEE
In a bid to reposition the universities in Nigeria, the management of various universities in the country has been embarking on various technology innovations aimed at increasing and improving the web presence of their institutions. This involves re-designing of websites using the latest state of the art technology so as to improve its usability. This research was conducted in order to know the usability level via accessibility evaluation of the federal universities in Nigeria. The automated tools used are Web Accessibility checker, HERA and WAVE. The tools inspected the conformity of the websites with Web Content Accessibility Guidelines (WCAG 1.0 and 2.0) by reporting violations in forms of errors and problems. Results show that all the websites have a number of accessibility errors hence they are not in total compliance with WCAG. Recommendations for improvement on the websites are included.