AKINYEDE RAPHAEL, OLUFEMI picture
AKINYEDE RAPHAEL, OLUFEMI

Publication

Publisher:
 Journal Of Information Systems Technology & Planning. Journal Of Information Systems Technology & Planning
Publication Type:
 Journal
Publication Title:
 BIOMETRIC SMART CARD POPULATION CENSUS AND NATIONAL POPULATION REGISTER
Publication Authors:
 Olabode Olatubosun, Adebayo Adetunmbi, Olufemi Raphael Akinyede & Kola Gabriel Akintola
Year Published:
 2016
Abstract:
Population census in Nigeria has suffered because of politics, ethnicity, religion, inter-ethnic struggle for political power, inter ethnic struggle for federal resources and inter-ethnic for socio economic competition. This article presents the design of a biometric smart card based system which can be implemented for the conduct population census and development of a national population register. The design is compose of enhancement algorithms of denoising fingerprint images using moving average filter, the model for segmentation of fingerprint, gradient-based local ridge orientation, binarization with Otsu algorithm, thinning of fingerprint image and minutiae extraction using the minutiae location and minutiae angles. Schema for the development of the national population register and the smart card implementation detail which typically consists of a processor and memory to process and store demographic and fingerprint biometric data of individuals are presented. 
Publisher:
 International Journal Of Computers And Technology
Publication Type:
 Journal
Publication Title:
 A SIGNATURE IDENTIFICATION SYSTEM WITH PRINCIPAL COMPONENT ANALYSIS AND STENTIFORD THINNING ALGORITHMS
Publication Authors:
 Olabode Olatunbosun, Adeniyi, Kehinde J. Akinyede Raphael O
Year Published:
 2015
Abstract:
Several biometric security systems have been implemented. Biometric is the use of a person’s physiological or behavioural characteristics to identify the individual. An example of behavioural method of biometric is signature identification. Signature identification is the use of handwritten signature to identify a person. This paper attempts to design and implement an algorithm for handwritten signature identification. The signature identification system consists of signature acquisition, preprocessing, features extraction and matching stages. Signature acquisition can be either online or offline (both were considered in this research work). Online signatures are obtained by signing on digital tablets while offline signatures are scanned (or snapped) into the system. Preprocessing stage of the system include turning the image to greyscale. The grey image is further converted to binary (black and white). The image is then thinned, using Stentiford thinning algorithm. Stentiford thinning algorithm in an iterative thinning method with a good thinned imaged output. The image is finally cropped to rid the image of unnecessary white spaces. For features extraction, principal component analysis is used. Principal Component Analysis is a good statistical tool for identifying pattern in data. Features extracted from each signature are stored as a template. After features extraction, the distances between signature templates are computed using Manhattan distance. If the distance exceeds a certain threshold, the test signature is rejected (otherwise it is accepted). The designed system has a FAR of 4% and an FRR of 6% for offline signatures. A FAR of 2% and an FRR of 3% were obtained for online signatures. 
Publisher:
 International Association Of Scientific Innovation And Research (IASIR) (An Association Unifying The Sciences, Engineering, And Applied Research)
Publication Type:
 Journal
Publication Title:
 A Prototype Design For Secure E-commerce Payment System Model
Publication Authors:
 Akinyede, Raphael Olufemi And Medale, Oluwafemi Ayodeji
Year Published:
 2015
Abstract:
In the beginning, heaven and earth were created, God charged the man he had created to increase, multiply, dominate and have authority over everything He had created. As a result of this charge, man in a global perspective is becoming increasingly technology driven; and across every sector of society, from government to consumer and in every endeavour, from work to play, man invented technology is transforming the way we live. There is no better illustration of this manifestation than the financial services sector, because, for centuries, banks have provided the means for efficient business processes, by enabling and supporting the buying and selling of goods and services. However, as commerce grows, market grows; the level of transaction –buying and selling -increases and the rate at which money is being carrying about also increases. The security report shows that theft is on the high side, hence, there is need for a better payment method. In our research paper, we develop a prototype for a secure e-commerce payment system model. 
Publisher:
 International Journal Of Computer Application (IJCA). 116(7). Pp 7-12
Publication Type:
 Journal
Publication Title:
 A RFID Based Inventory Control System For Nigerian Supermarkets
Publication Authors:
 Olutayo Boyinbode And Olufemi Akinyede
Year Published:
 2015
Abstract:
Having to spend 20 to 30 minutes on a queue, waiting for bought items to be scanned is a common problem that brings concern in this current shopping day in developing countries of Africa. This does not only cause wastage of time for the customers but also, it is a sure sign which shows the incompetence of the performance of current barcodes check-out technology. To resolve this problem, a new technology is introduced which can improve the inventory system process. This technology has great potential for the automation of inventory control system which uses the 13.56 MHz operating frequency RFID technology. This paper describes and implements a RFID based inventory control system for supermarkets in Nigeria. 
Publisher:
 . International Journal Of Computers And Technology. 14(9); Pp 6074-6084. Pp 12-27.
Publication Type:
 Journal
Publication Title:
 BIOMETRIC PERSONAL IDENTIFICATION ON 2D WAVELET TRANSFORM AND CHI-SQUARED MODEL
Publication Authors:
 Adeniyi Taiwo T. Olabode Olatunbosun, Iwasokun Gabriel B., Oluwadare Samuel A. And Akinyede Raphael O.,
Year Published:
 2015
Abstract:
Iris recognition system consists of image acquisition, iris preprocessing, iris segmentation and feature extraction with comparism (matching) stages. The biometric based personal identification using iris requires accurate iris segmentation for successful identification or recognition. Recently, several researchers have implemented various methods for segmentation of boundaries which will require a modification of some of the existing segmentation algorithms for their proper recognition. Therefore, this research presents a 2D Wavelet Transform and Chi-squared model for iris features extraction and recognition. Circular Hough Transform was used for the segmentation of the iris image. The system localizes the circular iris and pupil region and removes the occluding eyelids and eyelashes. The extracted iris region is normalized using Daugman’s rubber sheet model into a rectangular block with constant dimensions to account for imaging inconsistencies. Finally, the phase data (iris signature) from the 2D wavelet transform data is extracted, forming the biometric template. The chi-squared distance is employed for classification of iris templates and recognition. Implementing this model can enhance identification. Based on the designed system, an FAR (False Acceptances ratio) of 0.00 and an FRR (False Rejection Ratio) of 0.896 was achieved. 
Publisher:
 . IJCSI International Journal Of Computer Science Issues. 11(2); ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784.
Publication Type:
 Journal
Publication Title:
 DEVELOPMENT OF A COST-EFFECTIVE TELEMEDICINE SERVICES FOR PEOPLE AFFECTED WITH CARDIO-VASCULAR DISEASES IN THE RURAL AREA: A CASE STUDY OF IWO LOCAL GOVERNMENT
Publication Authors:
 Adenuga, K. I., Akinyede, R. O., And Akinsowon, O. A.,
Year Published:
 2014
Abstract:
In rural Nigeria, the health system is in a disreputable state and this is attributed to several factors especially the flagrant underfunding of the health sector and shortage of skilled specialists at the primary health care (PHC) level -as a result of the migration of a number of physicians from the rural areas to urban centers. The impact of this rural-urban migration has led to the shortage of trained personnel or specialists in the rural communities. This research work aims at developing a cost-effective telemedicine solution that will bridge the gap created as a result of migration of trained medical specialists from rural areas to urban centers. The website will be developed using PHP scripting language at the server side and connected to “MySQL” a relational database management system. HTML/CSS is the markup language that will be used for creating web pages and other information that can be displayed in a web browser. WampServer would be the web server for the application. Finally, an integrated portable ECG device to provide the waveform required by the specialist to recommend a possible treatment to the rural medical practitioner. The system was developed using Iwo local Government Council as a case study 
Publisher:
 International Journal Of Computer Science Trends And Technology (IJCST) V6(3): Page(47-55) May, 2018.
Publication Type:
 Others
Publication Title:
 Building A Secure Environment For Client-Side Ecommerce Payment System Using Encryption System
Publication Authors:
 Akinyede Raphael Olufemi, Alese Boniface Kayode, Adewale Olumide Sunday
Year Published:
 2014
Abstract:
Client-side computer, network connection between client and merchant web site’s server, web site’s server and software that allow it to run properly have become the target of attackers. Literature has shown that client-side network of the system has become the target of the attackers, this is because it involves buying, and selling and fund transfer by customers, merchants and financial institutions. Unfortunately, many of the researches that have been done in this area have not provided the required solutions. Hence, the purpose of this paper is to develop a client-side network security that safeguards information stored on the system from individuals that attempt to gain unauthorized access to data. Architecture of the system is designed by using advanced encryption system –AES encryption/decryption algorithm. The symmetric key cryptosystem can protect transaction data such as account numbers, amount and other payment information from alterations. The system uses the most common method of authentication which is user name and password. 
Publisher:
 Journal Of Scientific Research And Reports, Volume 12 ,Issue 6. [UK, 20% Contribution]
Publication Type:
 Journal
Publication Title:
 Fingerprint-Based Authorization Platform For Electronic-Based Examination
Publication Authors:
 G. B. Iwasokun, O. K. Akinyokun, R. O. Akinyede And S. S. Udoh
Year Published:
 2014
Abstract:
The advent of technology has revolutionized systemic approach to issues and methodology in different areas of life. Technological apparatus has stepped up human performance and efficiency in transportation, agriculture, entertainment, resource management, training, assessment and other areas of man’s endeavour. Specifically, educational assessment has witnessed a shift in paradigm. Since the traditional approaches to examination suffer in areas of security and standard, they are now being replaced in several places with electronic-based methods which have helped human factors in efficient service delivery. Existing electronic-based examination use PIN, password or token for authorization and they are susceptible to different forms of irregularities ranging from impersonation to other related practices. The research reported in this paper focused on the development of a platform that uses fingerprint-based technology for authenticating electronic-based examination takers with a view to improve on security and control. The platform uses suitable mathematical models for fingerprint database, enhancement, feature extraction and pattern matching. A prototype of the platform was subjected to evaluation using fingerprints from different scanners and 500 research subjects. Analysis of results on error rates and matching speed revealed the suitability of the proposed platform. 
Publisher:
 
Publication Type:
 Journal
Publication Title:
 Modeling A New Payment System For An Enterprise-class Electronic Commerce In Nigeria
Publication Authors:
 Akinyede Raphael Olufemi, Alese Boniface Kayode And Adewale Olumide Sunday
Year Published:
 2014
Abstract:
Buying and selling on the Net (e-commerce) is no more new to both the developed and developing nations. The issue now lies with the effectiveness of the existing payment system and the ICT infrastructures in place. This research examined the problems of the existing payment system in Nigeria and proposed a new one that would take care some of the limitations of the existing ones. The architecture of the proposed payment system was designed and coded using HTML to design the interfaces, JAVA Scripts as the scripting language that connects the front-end with the back-end and MySQL as the database. Application software was developed to simulate the design model using NetBeans IDE 6.9, MySQL database system and Java ME programming language. The simulation runs were done and hosted on www.elexsoft.com/mobilepaymentsystem/ and implemented on mobile browsers using Samsung android GT-S5830D smartphone, 800 Mhz Intel processor mobile phone. The system uses the most common method of authentication which is user name and password. 
Publisher:
 
Publication Type:
 Journal
Publication Title:
 Encryption And Tokenization-Based System For Credit Card Information Security
Publication Authors:
 Gabriel Babatunde Iwasokun, Taiwo Gabriel Omomule, Raphael Olufemi Akinyede
Year Published:
 2014
Abstract:
Existing methods for promoting credit card information security have exhibited confidentiality, privacy and integrity failures. In most cases, sensitive and classified data or information is presented in unencrypted formats to remote machines resulting in unauthorized access and disclosure. Based on these findings, this paper presents an RSA encryption and tokenization-based system for credit card information security. The proposed system is composed of the merchant and tokenization modules as well as a token vault. The merchant and the tokenization modules send credit card information and generate the transaction validation token respectively while the token vault is a database with restricted and controlled access hosted on a cloud storage engine. The implementation of the system was carried out on Pentium IV with 2.0 GHZ Duo Core Processor and 2 GB of RAM on Microsoft Windows 7 Operating System. APACHE server and HTML (Sublime) with CSS JavaScript served as the frontend while MySQL database from WAMP server and PHP joined as the backend on Mozilla Firefox browser. Analysis of the results of implementation with Master, Verve and Visa cards showed that the system delivered very high usability, adaptability and favorable experience for users. Analysis also showed the relative advantages and superiority of the system in credit card security, key size, mobile alert and tokenization over some other systems.