Papers by Odunayo Adeyinka
Smart Glove Project, 2024
Our product is a wearable device that both automates daily tasks such as controlling the lights, ... more Our product is a wearable device that both automates daily tasks such as controlling the lights, changing music, opening doors, and others. It integrates machine learning (ML) algorithms to understand and predict hand performed gestures, which allows users to control actuators in nearby locations. With our project we aimed to search for a niche in
the current home automation devices such as VUI after noticing that they feel invasive, less inclusive for people of different backgrounds or ages. Therefore, we have decided to explore a solution where users get to take control into their own hands
Authors: Piotr Kołpa, Lorenzo Emilio Rodríguez, Karthikeyan Tinagarane and Elijah Adeyinka
Gesture recognition, Machine Learning, Internet of Things

The application of computer is being used in almost every aspect of life. Precision and accuracy ... more The application of computer is being used in almost every aspect of life. Precision and accuracy can be gotten today by the use of computer. My motive behind this project is that that most business organizations does not have proper way of controlling and monitoring their business transactions. So I decided to embark on it as a project. This project was designed to automate transactions that occur on daily bases. The methodology adopted in carrying out this project is called the structure system analysis and design methodology (SSADM). The outputs of the design are to store records, generate report and take stock of all transactions on sales entry, purchase entry and stock availability. This project System architecture was design using UML, Architecture will be implemented using the following programming tools like HTML, CSS, JavaScript, PHP and AJAX using MySQL as the database of choice and platform independence for the front end; which make it flexible and most suited for project of this nature. Finally, the design and development of this system was employed in the overall system development and implementation.

Web technologies offer some very exciting benefits in Health Care environments, such as the ease ... more Web technologies offer some very exciting benefits in Health Care environments, such as the ease of use, capabilities to organise and link information (from distributed sources), strong multimedia presentation capabilities, and broad coverage of most hardware platforms and operating systems. These benefits have been adopted and used by the Electronic Medical Record Systems, which provide access to medical record information using Electronic Information Technologies.
In this Research, study the security problems related to the Electronic Medical Record (EHMs). More specifically we propose a security policy (based on the Role Based Access Control) that addresses many of the related security problems it also describes an Internet-based application for patient care using advanced multimedia techniques in a secure environment. The aim is to offer high quality care to users of health services over inexpensive communication pathways, using secure Internet-based, interactive communication tools. The provision of communication security over the Internet requires also the use of cryptographic and authentication techniques for Internet environment and the use of firewalls.
Electronic medical records (EMR) adoption is posited to improve patient care through enhancements in activities ranging from information access and exchange, to medical research. As such, a concerted governmental effort is underway to encourage EMR adoption. However, uptake has been slow as breaches have led to concerns over information security and privacy. The response of EMR managers to these concerns will be critical to EMR adoption. That said, managing information security and privacy is a complicated endeavour, requiring attention to multiple facets of the firm. Thus, research is needed to assist scholars and EMR managers in exploring and understanding the
6
related salient issues. This study conceptualizes and applies a framework based largely on the work of Dhillon (1997, 2006) which addresses the technical, formal, and informal dimensions of information security and privacy in the healthcare provider context. In doing so, it 1) describes and supports a conceptual framework for scholarly exploration of EMR information security and privacy issues, 2) highlights key issues within each dimension of the framework, and 3) provides an information security and privacy planning framework for EMR managers
Uploads
Papers by Odunayo Adeyinka
the current home automation devices such as VUI after noticing that they feel invasive, less inclusive for people of different backgrounds or ages. Therefore, we have decided to explore a solution where users get to take control into their own hands
Authors: Piotr Kołpa, Lorenzo Emilio Rodríguez, Karthikeyan Tinagarane and Elijah Adeyinka
In this Research, study the security problems related to the Electronic Medical Record (EHMs). More specifically we propose a security policy (based on the Role Based Access Control) that addresses many of the related security problems it also describes an Internet-based application for patient care using advanced multimedia techniques in a secure environment. The aim is to offer high quality care to users of health services over inexpensive communication pathways, using secure Internet-based, interactive communication tools. The provision of communication security over the Internet requires also the use of cryptographic and authentication techniques for Internet environment and the use of firewalls.
Electronic medical records (EMR) adoption is posited to improve patient care through enhancements in activities ranging from information access and exchange, to medical research. As such, a concerted governmental effort is underway to encourage EMR adoption. However, uptake has been slow as breaches have led to concerns over information security and privacy. The response of EMR managers to these concerns will be critical to EMR adoption. That said, managing information security and privacy is a complicated endeavour, requiring attention to multiple facets of the firm. Thus, research is needed to assist scholars and EMR managers in exploring and understanding the
6
related salient issues. This study conceptualizes and applies a framework based largely on the work of Dhillon (1997, 2006) which addresses the technical, formal, and informal dimensions of information security and privacy in the healthcare provider context. In doing so, it 1) describes and supports a conceptual framework for scholarly exploration of EMR information security and privacy issues, 2) highlights key issues within each dimension of the framework, and 3) provides an information security and privacy planning framework for EMR managers
the current home automation devices such as VUI after noticing that they feel invasive, less inclusive for people of different backgrounds or ages. Therefore, we have decided to explore a solution where users get to take control into their own hands
Authors: Piotr Kołpa, Lorenzo Emilio Rodríguez, Karthikeyan Tinagarane and Elijah Adeyinka
In this Research, study the security problems related to the Electronic Medical Record (EHMs). More specifically we propose a security policy (based on the Role Based Access Control) that addresses many of the related security problems it also describes an Internet-based application for patient care using advanced multimedia techniques in a secure environment. The aim is to offer high quality care to users of health services over inexpensive communication pathways, using secure Internet-based, interactive communication tools. The provision of communication security over the Internet requires also the use of cryptographic and authentication techniques for Internet environment and the use of firewalls.
Electronic medical records (EMR) adoption is posited to improve patient care through enhancements in activities ranging from information access and exchange, to medical research. As such, a concerted governmental effort is underway to encourage EMR adoption. However, uptake has been slow as breaches have led to concerns over information security and privacy. The response of EMR managers to these concerns will be critical to EMR adoption. That said, managing information security and privacy is a complicated endeavour, requiring attention to multiple facets of the firm. Thus, research is needed to assist scholars and EMR managers in exploring and understanding the
6
related salient issues. This study conceptualizes and applies a framework based largely on the work of Dhillon (1997, 2006) which addresses the technical, formal, and informal dimensions of information security and privacy in the healthcare provider context. In doing so, it 1) describes and supports a conceptual framework for scholarly exploration of EMR information security and privacy issues, 2) highlights key issues within each dimension of the framework, and 3) provides an information security and privacy planning framework for EMR managers