Scholarly Publication
Permanent URI for this collection
Browse
Browsing Scholarly Publication by Issue Date
Now showing 1 - 20 of 260
Results Per Page
Sort Options
- ItemAn Improved Coronary Heart Disease Predictive System Using Random Forest(Asian Journal of Research in Computer Science, 0021-08-11) Abdulraheem Abdul; Isiaka, Mope Rafiu; Babatunde, Ronke Seyi; Ajao, Jumoke FalilatAims: This work aim is to develop an enhanced predictive system for Coronary Heart Disease (CHD). Study Design: Synthetic Minority Oversampling Technique and Random Forest. Methodology: The Framingham heart disease dataset was used, which was collected from a study in Framingham, Massachusetts, the data was cleaned, normalized, rebalanced. Classifiers such as random forest, artificial neural network, naïve bayes, logistic regression, k-nearest neighbor and support vector machine were used for classification. Results: Random Forest outperformed other classifiers with an accuracy of 98%, a sensitivity of 99% and a precision of 95.8%. Feature selection was employed for better classification, but no significant improvement was recorded on the performance of the classifier with feature selection. Train test split also performed better that cross validation. Conclusion: Random Forest is recommended for research in Coronary Heart Disease prediction domain.
- ItemHigher Education and Information and Communication Technology in Nigeria: A Case Study of University of Ilorin and Ladoke Akintola University of Technology, Ogbomoso(Benin Journal of Educational Studies, 2009-01-10) Adedayo, Abdulkareem Yusuf; Isiaka, Mоре RafiuHigher Education in Nigeria is expected to contribute to national development through high level man power training and development. Consequently, tertiary institutions in the country are expected to actualize these goals by engaging in teaching, research, generation and dissemination of knowledge among others. This paper deals with the current mode, quality and level of actualization of the goals of Higher Education in Nigerian tertiary institutions, using University of llorin (a Conventional University) and Ladoke Akintola University of Technology (a Specialized University) as a case study. It identifies Information and Communication Technology (ICT) as a means for achieving the goals of the institutions by addressing the manner ICT could be applied in the various tasks of higher educational Institutions. Based on the findings of the study, it is recommended, among others that there is a dire need for a wholesome master plan for massive training of Nigerian graduates on ICT to Improve their quality on their current jobs and to brighten their chances for new jobs It further recommends the need for mandatory functional computer literacy programmnes for all undergraduates and suggests enhancement of ICT facilities in schools through public private partnership.
- ItemFactors Impeding Access and Utilization of Information Technology in Nigerian Higher Institutions(Proceedings of ICERI2011 Conference, 2011-12-30) Oyedele, J.; Isiaka, R.The use of Information and Communication Technology (ICT) in education lends itself to students centred teaching pedagogy. This phenomenon and the need for globalization and collaboration are further entrenching the need for ICT in education. To this end, Teachers are expected to exhibit high usage of ICT in their teaching and research, but unfortunately this is not exactly the case in Nigeria just like it is in many other developing countries. The crux of this study therefore was to identify the factors that impede access and utilization of ICT in Nigerian Higher Education Institutions. Two hundred and sixty-nine (269) lecturers in twenty two (22) tertiary institutions across the six geopolitical zone of Nigeria participated in the study. Four research questions were formulated. Structured questionnaire was used to seek experts’ opinions. The data collected were analyzed using percentages. Items that carried the highest percentage were considered the consensus of the respondents. The findings revealed factors impeding successful access and utilization of ICT in the higher education of Nigeria to include among others: social, economic, political, technical, human and electricity (power) factors. Based on the findings recommendations were made that: Higher Education Institutions should be connected to dedicated electricity power lines for guaranteed supply of electricity; the National Research and Education Network should be executed as dedicated Network and linked to Nigerian Universities Broadband Network for Internet access; adequately qualified staff should be engaged in the ICT units, they should be well remunerated and encouraged so that they would provide required technical support; ICT funding policies should be well concretized and enforced.
- ItemAgent-Based Faults Monitoring in Automatic Teller Machines(African Institute of Development Informatics and Policy - Computing, Information Systems and Development Informatics Journal, 3(4), 1 – 6, 2012) Bashir, S.A.; Mohammed, I.K.; Abdulsalam, S.O.Automated Teller Machine (ATM) has gained widespread acceptance as a convenient medium to facilitate financial transaction without need for human agent. However, ATM deployers are facing challenges in maximizing the uptime of their ATMs as a result of wide gap in fault detection, notification and correction of the ATMs. One way to ameliorate this situation is through intelligent monitoring of ATM by resident software agents that monitor the device real time and report faulty components real time to facilitate quick response. We proposed an architecture for rule-based, intelligent agent based monitoring and management of ATMs. Agents are used to perform remote monitoring on the ATMs and control function such software maintenance. Such agents can detect basic events or correlate existing events that are stored in a database to detect faults. A system administrator can securely modify the monitoring policies and control functions of agents. The framework presented here includes software fault monitor, hardware fault monitor and transaction monitor. A set of utility support agents: caller agent and log agent are used to alert network operator and log error and transaction information in a database respectively. at-1, stuck-at-0 faults in digital circuits validate the point that faulty circuits dissipates more and hence draw more power. Key words: Automated Teller Machine (ATM), Intelligent Agents, Mobile Agents, Event Monitoring
- ItemData Mining for Knowledge Discovery from Financial Institution Database(Society for Science and Nature - International Journal of Engineering and Management Sciences. 3(4), 409 – 415, 2012) Abdulsalam, S.O.; Adewole, K.S.; Bashir, S.A.; Jimoh, R.G.; Olagunju, M.Due to its importance for the investment decision-making and risk management, describing and predicting stock represents a key topic in stock analysis. Stock or shares are valued and analyzed by stock investors using fundamental analysis and technical analysis. Stock investors describe and predict stock manually based on individual experiences. Employing manual procedure in analyzing stock, most especially technical analysis is always very cumbersome and inefficient; because of much time that is consumed in examining the past records of a respective firm, an investor is willing to invest in. This paper presents a better way of describing and predicting stock, especially technical analysis, by employing data mining techniques. A database was developed employing 360 records of daily activity summary (equities) and 78 records of weekly activity summary (equities) spanning through 18 months that is, from January 2007 to June 2008. These data were obtained from the daily official list of the prices of all shares traded on the stock exchange published by the Nigerian Stock Exchange being the financial institution that runs Nigerian stock market; using banking sector of Nigerian economy with three banks namely:- First Bank of Nigeria Plc, Zenith Bank Plc, and Skye Bank Plc. A data mining software tool was developed and employed in identifying patterns and relationships from the database to generate new knowledge about the data set in the database through the use of data mining techniques that employ regression analysis. KEYWORDS: Data Mining, Stock Exchange, Financial Institution, Decision-Making, Risk Management, Regression Analysis
- ItemBuilding a Spammer Monitoring System Using Heuristic Rule-Based Approach(International Journal of Engineering and Technology, 2012-10-10) Adewole, Kayode S.; Babatunde, Ronke S.; Isiaka, Rafiu M.; Abdulsalam, Sulaiman O.Spam is a major problem of electronic mail system that has enjoyed extensive discourse. E-mail has been greatly abused by spammers to disseminate unwanted messages and spread malicious contents. Several anti-spam systems developed have been greatly abused and this is as evident in the proliferation of Spammer’s activities. Observing this fact, a protective mechanism to countermeasure the ever-growing spam problem is indeed inevitable. In this paper, a heuristic approach is proposed which employs a standard normalized Spammer’s languages harvested from Google and Yahoo spam language data set to build the knowledge base. The spam languages were prioritized based on the frequency of occurrence in the two global data sets. A threshold of 5% was established for a user without spamming history while 3% was set for a suspected spammer. A platform independent system was designed and implemented to monitor users’ mail in real time. As soon as the threshold is reached the user will be alerted and the suspected mail will be cancelled. The developed model was evaluated for accuracy and effectiveness using three composed email messages. It is recommended among others that this spam preventive model be incorporated in the architecture of every Internet Service Provider.
- ItemLearner Activities Evaluation Model: A Neuro-Fuzzy Approach(International Journal of e-Education, e-Business, e-Management and e-Learning, 2013-10-14) Omidiora, E. O.; Olabiyisi, S. O.; Okediran, O. O.; Isiaka, R. M.Computer Mediated Communication (CMC) platforms are incorporated in e-learning systems to actualize effective learning activities. Visualization techniques are been used to communicate the unstructured complex dataset of learners’ activities in the log files to the actors. The effectiveness of this approach as bases for teaching-learning support and learning analytics however relies on the commitment of the teacher. The teacher being human can become overwhelmed when the enrolment is large and/or when the Internet access is a problem. This paper presents a technique for capturing the teacher’s knowledge for monitoring learners’ activities in Neuro-fuzzy model for online automatic monitoring. The model intelligently provides inbuilt competence assessment and promptly takes decisions. The IEEE-LTSA is modified to reflect the initiative. Similarly, the integration of the model in an architecture based on Actuator- Indicator Models was demonstrated.
- ItemPredicting Nigeria Budget Allocation Using Regression Analysis: A Data Mining Approach(Nigeria Computer Society (NCS), Lagos, Nigeria - The Journal of Computer Science and Its Application, An International Journal of the Nigeria Computer Society. 21(1), 73 – 82, 2014) Adewole, K.; Mabayoje, M.; Abdulsalam, S.; Ajao, J.Budget is used by the Government as a guiding tool for planning and management of its resources to aid in effective decision-making. Data mining is one of the most vital areas of research with the objective of finding meaningful information from large datasets. The delay in the preparation of budget of the Federation by the Government has become incessant issue in the running of affairs of the country. This is evident in the delay in implementation of the previous budgets in the country; hence, the need for automated system to tackle the setback. In this paper, regression analysis which is one of the data mining techniques is employed to predict budget allocation from Nigeria budget dataset. 200 records consisting of the budget allocation summary for the year 2008, 2009, 2010, 2011, and 2012 across 40 data points containing Ministries, Departments, Commissions and Agencies (MDCAs) were used. A web-based data mining tool that employed linear regression to predict both Nigeria budget allocation across the 40 data points and the overall budget summary allocation of the Federation is proposed. The proposed data mining software predicted N1,803,196,024,657.40, N1,871,754,338,112.68 and N2,007,780,403,902.98 for the year 2013, 2014 and 2015 respectively. The tool is found capable of discovering interesting patterns in the data and for predicting budget allocation. Keywords: Budget, Data Mining, Dataset, Linear Regression, Prediction
- ItemDevelopment of an Intrusion Detection System in a Computer Network(Council for Innovative Research - International Journal of Computers and Technology, 12(5), 3479 – 3485, 2014) Babatunde, R.S.; Adewole, K.S.; Abdulsalam, S.O.; Isiaka, R.M.The development of network technologies and application has promoted network attack both in number and severity. The last few years have seen a dramatic increase in the number of attacks, hence, intrusion detection has become the mainstream of information assurance. A computer network system should provide confidentiality, integrity and assurance against denial of service. While firewalls do provide some protection, they do not provide full protection. This is because not all access to the network occurs through the firewall. This is why firewalls need to be complemented by an intrusion detection system (IDS).An IDS does not usually take preventive measures when an attack is detected; it is a reactive rather than proactive agent. It plays the role of an informant rather than a police officer. In this research, an intrusion detection system that can be used to deny illegitimate access to some operations was developed. The IDS also controls the kind of operations performed by users (i.e. clients) on the network. However, unlike other methods, this requires no encryption or cryptographic processing on a per-packet basis. Instead, it scans the various messages sent on a network by the user. The system was developed using Microsoft Visual Basic. Indexing terms: Intrusion detection system, illegitimate, misuse, network.
- ItemFrequent Pattern and Association Rule Mining from Inventory Database Using Apriori Algorithm(Institute of Electrical & Electronics Engineers (IEEE) - African Journal of Computing and ICT, A Journal of the Institute of Electrical & Electronics Engineers (IEEE) Computer Chapter Nigeria Section. 7(3), 35 – 42, 2014) Adewole, K.S.; Akintola, A.G.; Ajiboye, A.R.; Abdulsalam, S.O.Recently, data mining has attracted a great deal of attention in the information industry and in a Society where data continue to grow on a daily basis. The availability of huge amounts of data and the imminent need for turning such data into useful information and knowledge is the major focus of data mining. The information and knowledge obtained from large data can be used for applications ranging from market analysis, fraud detection, production control, customer retention, and science exploration. A record in such data typically consists of the transaction date and the items bought in the transaction. Successful organizations view such databases as important pieces of the marketing infrastructure. This paper considers the problem of mining association rules between items in a large database of sales transactions in order to understand customer-buying habits for the purpose of improving sales. Apriori algorithm was used for generating strong rules from inventory database. It was found that for a transactional database where many transaction items are repeated many times as a superset in that type of database, Apriori is suited for mining frequent itemsets. The algorithm was implemented using PHP, and MySQL database management system was used for storing the inventory data. The algorithm produces frequent itemsets completely and generates the accurate strong rules. Keywords: Apriori Algorithm, data mining, database, strong rules & inventory
- ItemMamdani Fuzzy Model for Learning Activities Evaluation(International Journal of Applied Information Systems (IJAIS), 2014-03-05) Isiaka Rafiu M.; Omidiora Elijah O.; Olabiyisi Stephen O.The intent of this paper is to determine the extent to which fuzzy model could suitably modelled learner activities in E learning system. However, the paucity of public dataset that meet the exact requirement of this work poses challenges, which necessitate dataset simulation. The detail approach used for the dataset simulation and the fuzzy model were discussed. Construction of the Inference Mechanism using the Relational Calculus and Mamdani approaches were demonstrated. The performance of the simulated model in MATLAB was measured using classifier uncertainty and confusion based metrics. The Mean Absolute Error (MAE) is 10.45; Root Mean Square Error (RMSE) is 8.71. The result shows that Fuzzy logic (White-Box Model) has a low classification error and invariably a higher accuracy for estimating learner activities. Subsequently, the result obtained shall be revalidated using live data of students’ activities in an online course. Furthermore, the current Mamdani’s model performance shall be compared with its equivalent Neuro_Fuzzy Model. The more efficient of the two models shall be the choice for integration into an Open Source Learning Management System for automatic learning activities evaluation.
- ItemDevelopment of an Intrusion Detection System in a Computer Network.(International Journal of Computers & Technology., 2014-03-14) Babatunde, R. S., Adewole K. S., Abdulsalam S. O. and Isiaka R. M. (2014)The development of network technologies and application has promoted network attack both in number and severity. The last few years have seen a dramatic increase in the number of attacks, hence, intrusion detection has become the mainstream of information assurance. A computer network system should provide confidentiality, integrity and assurance against denial of service. While firewalls do provide some protection, they do not provide full protection. This is because not all access to the network occurs through the firewall. This is why firewalls need to be complemented by an intrusion detection system (IDS).An IDS does not usually take preventive measures when an attack is detected; it is a reactive rather than proactive agent. It plays the role of an informant rather than a police officer. In this research, an intrusion detection system that can be used to deny illegitimate access to some operations was developed. The IDS also controls the kind of operations performed by users (i.e. clients) on the network. However, unlike other methods, this requires no encryption or cryptographic processing on a per-packet basis. Instead, it scans the various messages sent on a network by the user. The system was developed using MicrosoftVisual Basic.
- ItemDevelopment of Fingerprint Biometric Attendance System for Non-Academic Staff in a Tertiary Institution.(Computer Engineering and Intelligent Systems., 2014-04-13) Adewole, K. S., Abdulsalam S. O., Babatunde R. S., Shittu T. M. and Oloyede M. O. (2014)Institutions, companies and organisations where security and net productivity is vital, access to certain areas must be controlled and monitored through an automated system of attendance. Managing people is a difficult task for most of the organizations and maintaining the attendance record is an important factor in people management. When considering the academic institute, taking the attendance of non-academic staff on daily basis and maintaining the records is a major task. Manually taking attendance and maintaining it for a long time adds to the difficulty of this task as well as wastes a lot of time. For this reason, an efficient system is proposed in this paper to solve the problem of manual attendance. This system takes attendance electronically with the help of a fingerprint recognition system, and all the records are saved for subsequent operations. Staff biometric attendance system employs an automated system to calculate attendance of staff in an organization and do further calculations of monthly attendance summary in order to reduce human errors during calculations. In essence, the proposed system can be employed in curbing the problems of lateness, buddy punching and truancy in any institution, organization or establishment. The proposed system will also improve the productivity of any organization if properly implemented.
- ItemEnhanced Automated Teller Machine Using Short Service Authentication Service(African Journal of Computing and ICTs, 2014-05-16) Jimoh, R. G. & Babatunde, A.N.The use of Automated Teller Machine (ATM) has become an important tool among commercial banks, customers of banks have come to depend on and trust the ATM conveniently meet their banking needs. Although the overwhelming advantages of ATM cannot be over-emphasized, its alarming fraud rate has become a bottleneck in it’s full adoption in Nigeria. This study examined the menace of ATM in the society imposing additional security cost of running ATM services by banks in the country. The researchers developed a prototype of an enhanced Automated Teller Machine Authentication using Short Message Service (SMS) Verification. The usability of the developed prototype was examined using heuristic evaluation with the aid of a questionnaire designed based on validated software usability metrics. Responses from ten (10) respondents who are users of ATM cards in the country and the data collected were analyzed using Statistical Package for Social Science (SPSS). Based on the results of the analysis, it is revealed that the developed prototype will go a long way in reducing the alarming rate of ATM fraud in Nigeria. Keywords—ATM, ATM Fraud, E-banking, Prototyping.
- ItemAn Appropriate Search Algorithm for Finding Grid Resources(International Journal of Emerging Trends and Technology in Computer Science, 2014-06-16) Olusegun, O. A., Babatunde, A. N., Omotehinwa, T. O., Aremu, D. R. & Balogun, B. F.Abstract: A grid is a collection of computing resources that perform tasks. Searching within a grid resource is very challenging considering the potential size of the grid and wide range of resources that are represented. The aim of this study is to find the search algorithm that is appropriate for a search problem in a grid environment. Breadth first search, Depth first search and Depth first iterative deepening search algorithms were studied and analyzed to find the one with minimal complexity. The algorithms were implemented using graph with a collection of nodes. They were analyzed based on their completeness and optimality in terms of running time. Octave was used as the analysis tool to measure the time complexity of these search algorithms. From the analysis of these algorithms, Depth First Iterative deepening search algorithm was adopted as a search strategy for grid resources because of its completeness and optimality in terms of running time. The research shows that Depth First Iterative Deepening search algorithm is asymptotically optimal in terms of cost of solution, running time, and space required for uninformed searches. Therefore, DFID search is the best search strategy suitable for grid resources among the three search strategy studied in this work. Keywords: Grid, Breadth first search, Depth first search, Depth first iterative deepening search.
- ItemA Survey of Cloud Computing Awareness, Security Implication and Adoption in Nigeria IT Based Enterprises(Faculty of Communication and Information Sciences, University of Ilorin, Ilorin, Nigeria - International Journal of Information Processing and Communication, 3(1&2), 210 – 220, 2015) Bashir, S.A.; Adebayo, O.S.; Abdulsalam, S.O.; Sadiku, J.S.; Mabayoje, M.A.The advancement in information technology (IT) infrastructures and the overwhelming pervasive Internet accessibility has tremendously change the way computing is done in IT based enterprises. The recent hype of Cloud Computing that utilizes the existing Internet infrastructure to provide pay-as-you-go services to diverse community of businesses has emerged to alleviate and reduce the cost of computing tremendously. This paper examined the awareness of the Nigerian business enterprisesand their readiness in adopting cloud computing. It was found that the trend of awareness and adoption were very minimal with many being sceptical although few businesses were aware of the cloud technology. The survey also revealed that the stakeholders were precarious of the security-level of the cloud-based computing. Keywords: Cloud-Based Computing, Security Implications, Cloud Awareness, Cloud Adoption, Enterprises, Technology
- ItemComparative Analysis of Decision Tree Algorithms for Predicting Undergraduate Students’ Performance in Computer Programming(Faculty of Science, Adeleke University, Ede, Nigeria - Journal of Advances in Scientific Research & Applications, A Multidisciplinary Journal Publication of the Faculty of Science, Adeleke University, Ede, Nigeria, 2015) Abdulsalam, S.O.; Babatunde, A.N.; Hambali, M.A.; Babatunde, R.S.Educational data are increasing tremendously with little exploration by the education managers. Hidden knowledge can be discovered from the huge data sets available in educational databases through the use of data mining techniques. Educational data mining (EDM) is an emerging discipline, concerned with developing methods for exploring the unique types of data that reside in educational databases. One of the significant areas of the application of EDM is the development of student models for predicting students’ performances in their educational institutions. The focus of this work is to identify the optimal decision tree algorithms for predicting students’ performance in a computer programming course taken in 200 level based on their ordinary level results in Mathematics and Physics and their 100 level results in Mathematics and Physics courses. One hundred and thirty one (131) students’ records from computer science programme at Kwara State University (KWASU) between 2009 and 2013 were used. The attributes used are students’ ordinary level scores in Mathematics and Physics, 100 level results in Mathematics and Physics courses and the score in a 200 level computer programming course (CSC 203). C4.5 (known as J48 in WEKA) Classification and Regression Tree (CART), and Best-First Tree (BF Tree) decision tree algorithms were used in Waikato Environment for Knowledge Analysis data mining software to generate three classification models employed in predicting students’ performance in CSC 203. The results of these algorithms were compared using 10-fold cross validation method in terms of prediction accuracy and computational time. Our results showed that J48 tree has the highest prediction accuracy of 70.37% and least execution time of 0.02 seconds while CART and BFTree has prediction accuracy of 60.44% and 60.30% respectively and both having execution time of 0.22 seconds based on the data set used in this study. This study also revealed that previous knowledge of Mathematics and Physics both at Ordinary level and 100 level are essential determinants of students’ performance in a computer programming course. Keywords: Data Mining, Educational Data Mining, Decision Tree algorithm, Students’ Performance
- ItemLocal Binary Pattern and Ant Colony Optimization Based Feature Dimensionality Reduction Technique for Face Recognition Systems.(Journal of Advances in Mathematics and Computer Science, 2015-04-13) Babatunde, R.S, Olabiyisi, S. O., Omidiora, E. O. and Ganiyu, R. A. (2015)Feature dimensionality reduction is the process of minimizing the number of features in high dimensional feature space. It encompasses two vital approaches: feature extraction and feature selection. In face recognition domain, widely adopted face dimensionality reduction techniques include Principal component analysis, Discrete wavelet transform, Linear discriminant analysis and Gabor filters. However, the performances of these techniques are limited by strict requirement of frontal face view, sensitivity to signal shift and sample size, computational intensiveness amongst others. In this paper, a feature dimensionality reduction technique that employed Local binary pattern for feature extraction and Ant colony optimization algorithms for the selection of optimal feature subsets was developed. The developed technique identified and selected the salient feature subsets capable of generating accurate recognition. The average training time, recognition time and recognition rate obtained from the experiment on locally acquired face data using cross-validation evaluation approach indicate an efficient performance of the potential combination of both methods in a two-level technique for dimensionality reduction
- ItemDesign and Implementation of Ayo Olopon Game(Computing, Information Systems, Development Informatics and Allied Research Journal, 2015-05-13) Babatunde, A. N., Abikoye, O. C., Mabayoje, M. A., Akintola, G. A. & Oderemi, C.The difficulty encountered with the present manual mode of the “Ayo olopon” game is majorly on the tools used in playing it. The game utilizes the earth as the board of the game and uses stones, leaves as other parameters in playing it. Though some still use boards carved from wood and seeds but there is still a problem with portability. This research which is centred on automating the “Ayo olopon” game is inevitable because of the increasing need for system automation. There are many difficulties associated with the existing manual approach of playing the “Ayo olopon” game which ranges from loss or misplacing of seeds to inaccuracy in scores calculation due to human errors. This system is designed to efficiently handle the entire process of the game play. Two algorithms were implemented for the game manipulation. The first for handling the incrementing of the next cell while the other an entire play turn. Out of the diverse rules for the game play, one was selected and implemented. With the proposed system, “Ayo olopon” game playing is more efficient when compared to its present mode of play. The study outlined the concepts of the analysis and design methodology of the proposed system, compares it with the existing system and explains the design and implementation of the system using Microsoft C# as its programming language on the Visual Studio.NET platform serving as the Integrated Development Environment (IDE). The research was tested using the Windows operating system and worked successful. Keywords :- Ayo Olopon, Mancala Games, Cell, Seeds.
- Item: Assessing the performance of Random Partitioning and K-Fold Cross Validation methods of evaluation of a Face Recognition System.(Journal of Advances in Image and Video Processing, 2015-06-08) Babatunde, R. S, Olabiyisi S. O, Omidiora E. O, Ganiyu, R. A. and Isiaka, R. M. (2015)Face recognition has been an active research area in the pattern recognition and computer vision domains due to its many potential applications in surveillance, credit cards, passport and security. However, the problem of correct method of partitioning the face data into train and test set has always been a challenge to the development of a robust face recognition system. The performance of the System was tested on locally acquired face database when the face database was randomly partitioned and when k-fold Cross Validation partition was used. The face database was captured under the condition of significant variations of rotation, illumination and facial expression. Quantitative evaluation experimental results showed that Random Sampling technique has a higher average recognition rate (96.7%) than Cross Validation partition method (95.3%). However, recognition time in Cross Validation is faster (0.36 secs) than that of Random Sampling (0.38 secs).