Papers by Oluwatobi A K A N B I Johnson PhD

Behavioral Informatics Journal, 2020
Open and distance learning is getting more dependent on information and communication technology ... more Open and distance learning is getting more dependent on information and communication technology (ICT) and has been playing an important role in the delivery strategies of distance learning. With the advancement in technology in the field education has introduces variety of new techniques for educators and learners to enhance knowledge. Educational technologies (information and communication technology) are replacing direct teacherstudent interaction. Anything that helps distance learners to communicate: learner with instructor, learner with learner and learner with the learning materials may be term as information technology. Technological advancements especially in the area of ICT allow teachers to employ various strategies that could actively engage student's interest. This paper focuses the role of information and communication technologies (ICT) in open and distance education. This study also explores technology-based media which is very important for distance learners.
Nightingale International Journal of Pure and Applied Science, 2024
These challenges, the integration of AI in social sciences offers unprecedented opportunities for... more These challenges, the integration of AI in social sciences offers unprecedented opportunities for advancing knowledge and informing evidence-based policymaking. Interdisciplinary collaboration and ethical oversight are essential for harnessing the full potential of AI in social science.
MEDITERRANEAN PUBLICATION AND RESEARCH INTERNATIONAL, 2023
The modulation techniques covered include AM, FM, PM, ASK, FSK, PSK, and QAM. Furthermore, the ar... more The modulation techniques covered include AM, FM, PM, ASK, FSK, PSK, and QAM. Furthermore, the article shed light on the enabling technology in telephony and internet connectivity, specifically in 3G, 4G, 5G, WiFi 5, and WiFi 6. It then concludes that as communication technology continues to evolve, staying updated with modulation techniques and enabling technologies will be essential for optimizing communication systems and ensuring reliable and high-quality information transmission.

MEDITERRANEAN PUBLICATIONS AND RESEARCH INTERNATIONAL, 2024
In recent times, there has been a notable surge in interest surrounding the incorporation of virt... more In recent times, there has been a notable surge in interest surrounding the incorporation of virtual reality (VR) technology in education. This forward-thinking method has the capacity to fundamentally transform conventional teaching techniques, offering students immersive and interactive learning experiences. This article delves into the profound influence of virtual reality for truly immersive learning, delving into its advantages and obstacles, and presenting instances of effective application. Virtual reality (VR) technology in education has taken a giant leap forward. It's like having a magic portal that transports you to places and scenarios you've only read about. With VR, students can embark on virtual field trips, conduct experiments in virtual labs, and even take part in group projects with classmates from around the world, all from the comfort of their desks.

Cambridge Research Publications, 2024
Emergencies pose a significant threat to public health, safety, and the environment, requiring im... more Emergencies pose a significant threat to public health, safety, and the environment, requiring immediate responses to prevent further escalation. This study explores the integration of Bayesian Belief Learning (BBL) with Natural Language Processing (NLP) to classify and detect emergencyrelated incidents through social media data, specifically Facebook posts. Using a dataset of 450 instances, the hybrid model processes user data, posts, comments, location, and timestamps to identify emergency types such as robbery, kidnapping, violence, cultism clashes, and vandalism. The system achieves a precision of 90.93%, highlighting its efficacy in filtering public sentiment and providing actionable insights for real-time disaster response. Bayesian probability is employed to quantify relationships between observable factors and emergency events, enabling multi-class classification of incidence. Despite high accuracy, the model faces challenges like false positives and the inherent independence assumption in Bayesian methods, which may limit its performance in real-world scenarios. This research demonstrates the potential of combining probabilistic modeling with NLP for improving emergency management systems, offering a scalable solution for real-time detection and response to crises. Future work should focus on refining algorithms, enhancing real-time integration, and fostering collaboration with emergency agencies for operational deployment.

Journal of Systematic and Modern Science Research (JSMSR)
The study examined the development of Massive Open Online Courses (MOOCs) on the Open edX platfor... more The study examined the development of Massive Open Online Courses (MOOCs) on the Open edX platform, designed for unlimited academic participation and open access via the web. It contrasted this with the existing National Open University (NOUN) platform, which utilizes a connectivist MOOC (cMOOC) on Moodle. The cMOOC setup on Moodle runs all major components on a single server, leading to inefficiencies. To address this, primary data were gathered through oral interviews with students from NOUN, Awa-Ijebu Study Centre, while secondary data were obtained from online sources and journals. The proposed solution involves developing an Open edX Mockup platform for NOUN written in Python. This platform utilizes operational disintegration, enabling each component to function as a microservice. Courses are stored in MongoDB, with videos hosted on Amazon S3. Results indicate successful functionality, including course creation, content management, course enrolment, account creation for learners.

International Journal of African Reseaarch and Sustainability Studies Published by Cambridge Research and Publications, 2024
Information systems (IS) play a vital role in organizations by capturing, storing, and managing d... more Information systems (IS) play a vital role in organizations by capturing, storing, and managing data to facilitate service delivery. The adoption of IS as a service delivery model offers benefits such as cost-effectiveness, scalability, and agility. However, challenges arise in the areas of security, vendor lock-in, and data privacy. Security concerns include data breaches, access control, and compliance with regulations. Vendor lock-in challenges arise from interoperability issues, migration costs, and limited control. Data privacy concerns include data location and sovereignty, data handling and ownership, and breach notification. Organizations must address these challenges by evaluating service providers, conducting risk assessments, establishing clear agreements, and implementing robust security measures. Ongoing monitoring, auditing, and collaboration are crucial for maintaining data privacy, security, and mitigating vendor lock-in risks. By addressing these challenges effectively, organizations can harness the benefits of IS as a service delivery model while ensuring the integrity and privacy of their data.

Nigeria Computer Society
The integration of artificial intelligence (AI) systems into daily routines raises significant co... more The integration of artificial intelligence (AI) systems into daily routines raises significant concerns about trust and reliability. Addressing these concerns is critical to ensuring the ethical and reliable deployment of AI technologies. This study explores the key elements necessary to establish trust in AI systems, including core principles, challenges, and best practices. To build trusted and reliable AI systems, it is imperative to adhere to principles of transparency, fairness, robustness, privacy, and continuous improvement. Addressing the identified challenges through rigorous testing, ethical considerations, and robust data management practices is crucial for the successful integration of AI into society. This ongoing effort will help unlock the full potential of AI while minimizing risks and ensuring ethical deployment. By focusing on these aspects, the study contributes to a better understanding of the requirements for building trusted and reliable AI systems, ultimately aiming to foster their ethical and effective integration into daily life.

UIJSLICTR, 2025
This research addresses the classification of emergency incidents arising from both natural and h... more This research addresses the classification of emergency incidents arising from both natural and human-induced events, emphasizing the necessity for timely intervention and strategic mitigation. It introduces a hybrid data mining approach that integrates Natural Language Processing (NLP) with Bayesian Belief Learning (BBL) to enhance sentiment analysis during crisis scenarios. Real-time data is extracted from Facebook through the Graph API using Python's requests library. The collected data undergoes preprocessing and is stored in a MySQL database, while the system interface utilizes XML and PHP to display sentiment outcomes. The integration of supervised learning into the NLP process resulted in a signal precision exceeding 92.8%, surpassing the accuracy of existing approaches. A confusion matrix is employed to assess the model's performance, confirming its high level of predictive precision. The system demonstrates strong capabilities for improving proactive emergency detection and management.

INTERNATIONAL JOUNAL OF: SCIENCE RESEARCH AND TECHNOLOGY , 2023
Digital forensics is a branch of forensic science that deals with the acquisition, preservation, ... more Digital forensics is a branch of forensic science that deals with the acquisition, preservation, and analysis of digital evidence. In recent years, the use of digital devices and technologies has become ubiquitous, resulting in an increase in the volume and complexity of digital evidence. Digital forensics plays a crucial role in the investigation of crimes involving digital evidence and is also used in civil litigation, internal investigations, and incident response. This paper provides an overview of digital forensics, including its definition, scope, and key principles. It discusses the various categories of digital evidence and the challenges involved in preserving and analyzing them. The paper also highlights the legal and ethical considerations of digital forensics, including issues related to privacy, chain of custody, and admissibility of evidence in court. Finally, the paper concludes with a discussion of the importance of maintaining scientific rigor in digital forensic investigations to ensure the accuracy and reliability of evidence. Overall, this paper provides a comprehensive overview of digital forensics and its importance in today's digital age.
Keywords: Digital, Devices, Evidences, Forensic, Investigation, Media.

African Journal of Advanced Sciences & Technology Research, 2023
African countries should integrate ICT into their governance structures in order to develop
poli... more African countries should integrate ICT into their governance structures in order to develop
policies to advance national social cohesion. Developing an e-Cultural Synchronize model
towards national unity in African nations with the synchronizing of indigenous cultures acting as
the fulcrum allows us to offer a heuristic. The argument is based about the need for African states
to pay closer attention to the cultural textile of their respective communities in order to show
that several aspects of African culture are not incompatible with democratic governance or other
forms of government which some African leaders have tried. This will help to ease tensions
between different cultures. This article highlighted different e-governance model that have been
developed, then the model that is widely adopted with the stages involved. It also discusses how
e-cultural synchronization model can be achieved with four stages of development. In this study,
e-CS is not portrayed as a magic bullet for solving the problems crucial national integration in
African nations, especially those with diverse populations. The e-CS was primarily created to
provide data on e-Government portals regarding co-cultural entities in different African
countries, and it is thought to be a significant part of national integration procedures. The study
also revealed some basic components that e-governance requires to operate effectively and
efficiently which are energy; telecommunications and related technologies; and dedicated
political leadership. Indigenous cultural synchronization as a means of fostering national
cohesiveness has received little attention in comparison to ideological decisions and democratic
governance in a number of attempts at national unification.

TIMBOU -AFRICA ACADEMIC PUBLICATIONS, 2022
The need to forestall an emergency situation or natural disaster is quite germane to avoid destru... more The need to forestall an emergency situation or natural disaster is quite germane to avoid destruction of valuable properties like infrastructure or learning resources and loss of lives.Incessant violence and natural disasters are partially
responsible for severe destruction
of academic resources. Hence
the need for intelligent agent
that can control emergency
situation on our campuses. In this
study, the context of agent-based communication which is very supportive and adaptive for environmental deployment and proactive reaction was considered,
as well as embedding surveillance gadgets with signal sensors and perceives incidences; it communicates with dispatcher to determine appropriate rescue agent. Proposed framework of intelligent agent uses data sequence for specific cases that can be compiled for manipulation and quick response to preempt fire
outbreak. Inference engine handles the recognize-act principle of the production pattern, designed for goal and data driven.
Keywords: Intelligent-agent, Framework, Academic environment, Emergency,
Detector
International Journal of Recent Engineering Science , 2022
A compiler is designed as a language translator to interpret program instructions from high-level... more A compiler is designed as a language translator to interpret program instructions from high-level language or object layer to machine code. Compiler configuration covers essential interpretation instruments and blunders discovery and recovery. It incorporates lexical components, linguistic structures, and semantic mechanisms as the front end and code generation and streamlining as the back end. In this paper, selected code generation techniques were structurally x-rayed. The structural review revealed the peculiar strategy and individual traits that serve as a determinant factors for specific applications and circumstances for execution.

International Journal of Engineering Inventions, 2022
Around the world, many methods of emergency notice and response are used. Governments, corporatio... more Around the world, many methods of emergency notice and response are used. Governments, corporations, and
individuals all take emergencies very seriously, and they continue to come up with inventive ways to respond to
them quickly. As time passes, the number of tragic events continues to rise. As a result, there has been a growth
in the number of techniques to ensure real-time communication to the appropriate parties. Communication is
critical both for rescue squad and the victims during a crisis. Because one of the core purposes of all higher
institutions is to provide safe and comfortable learning environments; in this regards, this study addresses the
need for improved emergency alert systems. The system is designed to function in the Federal College of
Animal Health and Production Technology, Ibadan Nigeria in the event of emergencies such as fire outbreak,
medical problems, accidents, cultism, and kidnapping are amongst others. In this study, the Emergency Alert
Management System (EAMS) broadcasts emergencies to several devices at the same time, and only registered
response teams within the College are contacted when an emergency occurs. This is a web-based system
designed from the scratch and developed with HTML (Hypertext markup language) for the UI framework, PHP
(Hypertext Preprocessor) for the backend, XAMPP for the web server, phpMyadmin for the database, and
Sublime Text for scripting the environment.
A chipset is a group of electronic parts in an embedded system that regulates data stream between... more A chipset is a group of electronic parts in an embedded system that regulates data stream between the CPU, storage, and accessories. It is often found on the motherboard and is intended to function with a particular processor family. This study provides a conceptual review of chipset security. A bus is a section of hardware that connects an attached component to the appropriate bridge via a chipset. These buses go at different speeds depending on whether they are attached toward the northbridge or the southbridge, along with their intended destination.
Uploads
Papers by Oluwatobi A K A N B I Johnson PhD
Keywords: Digital, Devices, Evidences, Forensic, Investigation, Media.
policies to advance national social cohesion. Developing an e-Cultural Synchronize model
towards national unity in African nations with the synchronizing of indigenous cultures acting as
the fulcrum allows us to offer a heuristic. The argument is based about the need for African states
to pay closer attention to the cultural textile of their respective communities in order to show
that several aspects of African culture are not incompatible with democratic governance or other
forms of government which some African leaders have tried. This will help to ease tensions
between different cultures. This article highlighted different e-governance model that have been
developed, then the model that is widely adopted with the stages involved. It also discusses how
e-cultural synchronization model can be achieved with four stages of development. In this study,
e-CS is not portrayed as a magic bullet for solving the problems crucial national integration in
African nations, especially those with diverse populations. The e-CS was primarily created to
provide data on e-Government portals regarding co-cultural entities in different African
countries, and it is thought to be a significant part of national integration procedures. The study
also revealed some basic components that e-governance requires to operate effectively and
efficiently which are energy; telecommunications and related technologies; and dedicated
political leadership. Indigenous cultural synchronization as a means of fostering national
cohesiveness has received little attention in comparison to ideological decisions and democratic
governance in a number of attempts at national unification.
responsible for severe destruction
of academic resources. Hence
the need for intelligent agent
that can control emergency
situation on our campuses. In this
study, the context of agent-based communication which is very supportive and adaptive for environmental deployment and proactive reaction was considered,
as well as embedding surveillance gadgets with signal sensors and perceives incidences; it communicates with dispatcher to determine appropriate rescue agent. Proposed framework of intelligent agent uses data sequence for specific cases that can be compiled for manipulation and quick response to preempt fire
outbreak. Inference engine handles the recognize-act principle of the production pattern, designed for goal and data driven.
Keywords: Intelligent-agent, Framework, Academic environment, Emergency,
Detector
individuals all take emergencies very seriously, and they continue to come up with inventive ways to respond to
them quickly. As time passes, the number of tragic events continues to rise. As a result, there has been a growth
in the number of techniques to ensure real-time communication to the appropriate parties. Communication is
critical both for rescue squad and the victims during a crisis. Because one of the core purposes of all higher
institutions is to provide safe and comfortable learning environments; in this regards, this study addresses the
need for improved emergency alert systems. The system is designed to function in the Federal College of
Animal Health and Production Technology, Ibadan Nigeria in the event of emergencies such as fire outbreak,
medical problems, accidents, cultism, and kidnapping are amongst others. In this study, the Emergency Alert
Management System (EAMS) broadcasts emergencies to several devices at the same time, and only registered
response teams within the College are contacted when an emergency occurs. This is a web-based system
designed from the scratch and developed with HTML (Hypertext markup language) for the UI framework, PHP
(Hypertext Preprocessor) for the backend, XAMPP for the web server, phpMyadmin for the database, and
Sublime Text for scripting the environment.