<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>DSpace Collection:</title>
  <link rel="alternate" href="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/129" />
  <subtitle />
  <id>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/129</id>
  <updated>2026-02-18T15:15:36Z</updated>
  <dc:date>2026-02-18T15:15:36Z</dc:date>
  <entry>
    <title>A Review of Ontology Development Methodologies: The Way Forward for Robust Ontology Design</title>
    <link rel="alternate" href="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/28966" />
    <author>
      <name>Aminu, Enesi Femi</name>
    </author>
    <author>
      <name>Oyefolahan, Ishaq Oyebisi</name>
    </author>
    <author>
      <name>Abdullahi, Muhammad Bashir</name>
    </author>
    <id>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/28966</id>
    <updated>2024-06-25T20:20:13Z</updated>
    <published>2023-01-01T00:00:00Z</published>
    <summary type="text">Title: A Review of Ontology Development Methodologies: The Way Forward for Robust Ontology Design
Authors: Aminu, Enesi Femi; Oyefolahan, Ishaq Oyebisi; Abdullahi, Muhammad Bashir
Abstract: In this present age, the application of ontology as a data modeling technique across different fields of study, for example, knowledge management and information retrieval systems, is indispensable. This development is&#xD;
necessary to find viable solutions to the challenges of data heterogeneity and concept mismatch. Therefore, the end goal is geared toward achieving machine-represented data; in other words, the data are being modeled&#xD;
ontologically. There are existing ontology design methodologies; however, a single methodology is often not complete to design a robust ontology. Thus, this research aims to review the existing standard methodologies through concept-based analysis that suggests a way forward to design robust ontology. The analysis of the review is carried out by considering the goals of achieving robust ontology design, such as data integration, accessibility, reusability, and domain granularity. Based on the literature, this review shows that collaborative design with domain experts, application of standard evaluation techniques, modification of existing ontology development methodologies, types of ontology, and ontology-based machine learning models are determinant factors that define the robustness of ontology. Therefore, if an ontology developer pays attention to these criteria to design an implementable model, this would pave way for robust ontology to be designed.</summary>
    <dc:date>2023-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Feature Selection Strategies for Enhancing the Accuracy for Detecting Polycystic Ovary Syndrome (PCOS) Health Problem</title>
    <link rel="alternate" href="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/27587" />
    <author>
      <name>Ekundayo, A</name>
    </author>
    <author>
      <name>Alhassan, J. K</name>
    </author>
    <author>
      <name>Aminu, E. F</name>
    </author>
    <author>
      <name>Adepoju, S. A</name>
    </author>
    <author>
      <name>Aliyu, H. O</name>
    </author>
    <author>
      <name>Ojerinde Oluwaseun Adeniyi</name>
    </author>
    <author>
      <name>Ekundayo, M. A</name>
    </author>
    <id>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/27587</id>
    <updated>2024-07-14T08:41:25Z</updated>
    <published>2023-11-01T00:00:00Z</published>
    <summary type="text">Title: Feature Selection Strategies for Enhancing the Accuracy for Detecting Polycystic Ovary Syndrome (PCOS) Health Problem
Authors: Ekundayo, A; Alhassan, J. K; Aminu, E. F; Adepoju, S. A; Aliyu, H. O; Ojerinde Oluwaseun Adeniyi; Ekundayo, M. A
Abstract: A hormonal condition called Polycystic Ovarian Syndrome (PCOS) results in larger ovaries&#xD;
 with tiny cysts on the margins. Although the exact etiology of Polycystic Ovary Syndrome&#xD;
 is unknown, it may be a result of both hereditary and environmental factors. One of the&#xD;
 endocrine diseases that most frequently affect women of reproductive age is Polycystic&#xD;
 Ovary Syndrome (PCOS). Artificial intelligence (AI)-based machine learning models has the&#xD;
 capacity to classify and predict the potential for PCOS condition. The dataset used in this&#xD;
 study was obtained from Kaggle repository which consists of 45 features (attributes) and&#xD;
 541 data points. This dataset was balanced using the Synthetic Minority Oversampling&#xD;
 Technique (SMOTE) and features were selected by employing firefly and fruitfly&#xD;
 optimization algorithms. The firefly optimized algorithm with Random Forest obtained an&#xD;
 accuracy score of 95.205% with 18 selected features. The KNN with firefly algorithm used&#xD;
 13 features and obtained an accuracy of 91.096%. The SVM with firefly algorithm uses 14&#xD;
 features and obtained an accuracy of 93.151%. The fruitfly algorithm with KNN, SVM and&#xD;
 RF obtained and accuracy of 86.986%, 90.411% and 93.151% respectively.</summary>
    <dc:date>2023-11-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>An approach to Improving Columnar Permutation Cipher for Wills in Distributed Systems of Law Firms</title>
    <link rel="alternate" href="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/26817" />
    <author>
      <name>Nwokedi, Emeka</name>
    </author>
    <author>
      <name>Ojerinde Oluwaseun Adeniyi</name>
    </author>
    <author>
      <name>Ojeniyi, Joseph</name>
    </author>
    <author>
      <name>Adepoju, Solomon Adelowo</name>
    </author>
    <id>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/26817</id>
    <updated>2024-07-14T08:25:22Z</updated>
    <published>2021-01-01T00:00:00Z</published>
    <summary type="text">Title: An approach to Improving Columnar Permutation Cipher for Wills in Distributed Systems of Law Firms
Authors: Nwokedi, Emeka; Ojerinde Oluwaseun Adeniyi; Ojeniyi, Joseph; Adepoju, Solomon Adelowo
Abstract: With the evolution of cryptography in the twentieth century, classical ciphers (transposition ciphers) are gradually being pushed out because it now possesses low security ratings, however we can still salvage them, as they have other desirable and admirable qualities which include: easy of design, medium technical know-how and low computational power and it is to achieve this that this study; “A three layer permutation Cryptosystem using a modification of Transposition cipher and two layers content permutation for Wills” was carried out . The aim of this study is to make columnar transposition more secure and relevant so that companies with low technology budget and know-how be secured from known cryptosystem attack. The method used to achieve the above aim is adding to columnar transposition the technique of rail cipher, this affected the sequence of transposition, and lead to a new encryption equation and function. Cryptanalysis was carried out using various tools (Cryptool 2, Dcode and Countwordsfree) and parameters, using a transposition decoder the cipher text gotten using the traditional transposition cryptosystem decrypted with a hundred percent word and character accuracy whilst using the improved system gave a thirty percent accuracy.</summary>
    <dc:date>2021-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Integration Of Consortium Blockchain Model In The Nigerian Banking Sector</title>
    <link rel="alternate" href="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/26781" />
    <author>
      <name>Ojerinde Oluwaseun Adeniyi</name>
    </author>
    <author>
      <name>Salawu, Jonathan</name>
    </author>
    <author>
      <name>Abisoye, Opeyemi A.</name>
    </author>
    <author>
      <name>Uduimoh, Andrew A.</name>
    </author>
    <id>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/26781</id>
    <updated>2024-07-14T08:19:52Z</updated>
    <published>2021-01-01T00:00:00Z</published>
    <summary type="text">Title: Integration Of Consortium Blockchain Model In The Nigerian Banking Sector
Authors: Ojerinde Oluwaseun Adeniyi; Salawu, Jonathan; Abisoye, Opeyemi A.; Uduimoh, Andrew A.
Abstract: Conventionally, Nigerian banks rely on a less secure and time-consuming centralized clearinghouse where transactions are sorted out and balances are made. This paper presents a model for integrating permission DLT into the Nigerian banking sector. The proposed model has utilized Corda – permissioned DLT, to log transactions between parties on the chain such that those transactions are only visible to the participants of the transaction, thus, combatting fraudulent claims. Participants' details are also verified upon provision of their National Identification Number (NIN) and Bank Verification Number (BVN) as stipulated in the smart contract. This work has also avoided the problems inherent in the public blockchain that requires miners to spend gigantic computer resources and time validating and verifying blocks before being added to the chain. The result obtained is a developed DLT model for logging real-time transactions between banks and their clients.</summary>
    <dc:date>2021-01-01T00:00:00Z</dc:date>
  </entry>
</feed>

