Department of Computer Engineering
Permanent URI for this collection
Browse
Recent Submissions
Item EVALUATION OF TARGETED FRAUD STRATEGIES ON VULNERABLE INDIVIDUALS OF DEVELOPED NATIONS(Proceedings of 174th ISERD International Conference, New York, USA,, 2019-10-17) WAHAB, WAJEED BOLANLE; OYEDIRAN, MAYOWA OYEDEPO; OLUSESI, AYOBAMI TAIWOThe aim of this study is to analyze the different methods in which cyber criminals perpetrate their fraudulent acts on vulnerable individuals of developed nations. The set objectives of the study are to identify different strategies used to defraud vulnerable victims of developed nations, collect data from cyber criminals and victims via Google forms (questionnaires) and to analyze the data using statistical package for social sciences. Primary data were collected for the study from primary source using Google form (questionnaires). The data where then analyzed using spread sheet package. The data collected were based on the types of strategies used in targeting vulnerable individuals , benefits of the illicit acts, continents where they operate from, reactions after successful fraud, why victims fall prey to the scams and what will make fraudsters quit fraud. These parameters were used as an input in the analysis stage for the study. Recommendations and certain measures which will help individuals in avoiding being a victim of cybercrime were proposed.Item Design and Implementation of a GSM based Electronic Appliances Monitoring and Controlling System(International Journal of Advanced Research in Computer and Communication Engineering, 2016-03-01) Oyediran, Mayowa Oyedepo; Akande, Noah OluwatobiThis paper presents a GSM based electronic appliances monitoring and controlling system. This enables individuals to connect their home or office electronic appliances to the developed system which in turn enables them to remotely monitor and control these appliances though a Short Message Service (SMS). In remotely controlling the connected electronic appliances, users can determine the status of the electronic appliances remotely and decide whether to either switch any of the connected electronic appliances on or off. The uniqueness of the approach introduced is further revealed in the way the GSM module of the developed system was integrated with thePIC16F877Amicrocontroller to give a single and more compact system. Also, the SMS format used in monitoring and controlling the connected electronic appliances allows users to control their electronic appliances from anywhere provided there is a GSM network; hence, distance was not a barrier. The SMS format used is not lengthy and is simple to understand which makes it attractive to its users. The performance of the developed system was evaluated by connecting twelve (12) electronic appliances with it and the developed system shows the capability to remotely monitor and control them.Item Development of An Examination Authentication Embedded System Based on Fingerprint Approach(International Journal of Computers & Technology, 2018-03-16) Oyediran, Mayowa Oyedepo; Wahab, Wajeed Bolanle; Elegbede, Adedayo Wasiat; Enegbe, Toye JolieSecurity is crucial all around. Access into institutions, examination centers, organizations or even estates ought to be controlled and closely monitored through a verification system. The method of authenticating a student for an examination has an obvious problem such as presentation of fake clearance card, impersonation and so on and the unethical manner associated with the examination is a grim issue that requires the stakeholders in academic area to seek for alternative means of authenticating student for examination, because the manual paper-based clearance process is fundamentally flawed. Sequel to that, a dependable and effective system is designed to tackle the issues of the convectional technique. The system will verify the understudy using fingerprint biometrics technique and generate a report which can serve as an attendance.Item A Survey on Migration Process of Mobile Agent(Proceedings of the World Congress on Engineering and Computer Science, 2016-06-09) Oyediran, M. O; Fagbola, T. M; Olabiyisi, S. O; Omidiora, E. O; Fawole, A. OMobile agent is a software object that migrates through many nodes of a heterogeneous network of computers under its own control in order to perform task using resources of these nodes, during the past several years, mobile agent has received significant attention. Not only in the wide range of commercial and law enforcement applications, but also the availability of feasible technologies, Although current migration process of mobile agent systems have reached a certain level of maturity, Autonomous migration of mobile agent is an area that has witnessed a lot of research activity and their development is still limited by the conditions brought about by many real applications. Several approaches have been proposed for the migration process of mobile agent. This paper provides an up-to date survey of migration process of mobile agent research. To present a comprehensive survey, we categorize existing mobile agent migration process approaches and present detailed descriptions of representative methods within each category with special focus on the soft computing approaches.Item Development of an Optimized Mobile Agent Migration Pattern for Pull-All Data Strategy(British Journal of Mathematics & Computer Science, 2016-05-22) Oyediran, M. O.; Fagbola, T. M.; Olabiyisi, S. O.; Omidiora, E. O.A mobile agent is a software entity that migrates from one host to another, performing data collection and software configuration tasks on behalf of users in distributed networks. However, studies have shown that the existing pull – all data strategy of mobile agent migration pattern moves data from one host to the next host along with the mobile agent, thereby resulting in data accumulation which lowers the performance of the mobile agent in terms of transmission time and network load. This research developed an optimized mobile agent migration pattern for the pull-all data strategy in distributed networks using path strategy of Ant Colony Optimization (ACO) technique. The obtained results shows that the optimized pull-all data migration pattern developed produced lower network load and transmission time than the existing pull-all data migration pattern.Item An Embedded Arduino based LPG Detection System with SMS Alert and Automatic Gas Shut Off(Journal of Scientific and Engineering Research, 2019-02-03) Olusanya, Olamide O.; Oyediran, Mayowa O.; Usman, Musa; Elegbede, Adedayo W.; Fawole, Ayobami O.; Adebo, KingThe level of technological advancement which engendered enhanced transportation of Liquefied Petroleum Gas (LPG) has, to a large extent, solved the problem of energy demand. Unfortunately, in doing this, it brought about concomitant risk- damage to the pipes as a result of human errors, natural disasters, and acts of vandalism. This paper addresses the issue of gas leakage and proposes a leakage detection system using an MQ 2 gas sensor, a buzzer, and a GSM module. A response mechanism which shut off the supply of gas when the level of leakage seems not to reduce.Item Development of a Model for International Traveler’s Check-In Process Using Arena Software Tool(Scientific Research Publishing, 2020-11-30) Olusanya, O. O.; Obetta, J. L.; Oyediram, M. O.; Elegbede, A. W.The increasing demand for airline services amidst limited resources results in passenger dissatisfaction and dwindling revenue for airports and airlines. The dynamics of service demand and resource supply results in check-in issues for the stakeholders in the commercial aviation industry. This has the effect of impacting negatively on service performance, cost of operations, customer satisfaction, and overall throughput. Hence, this paper modelled the travelers’ check-in process at the “D Wing” of the Departure Section of Murtala Mu hammed International Airport (MMIA), Ikeja, using Arena Software Tool. The work was carried out by determining the parameters of the queues at designated service points in the check-in process. The primary data required to develop the model were acquired by direct observation of passenger flow and oral interview. Thus, the average check-in time was determined. Thereafter, a model of the international check-in system of the MMIA was developed using Arena software in combination with Microsoft Office tools. The data collected were therefore inputted into the model and simulated; the real result was compared with the simulation result of 133 completions and there was no significant difference. The result showed that the model is a re presentation of the real system under study. Further work will be tailored to wards simulation(i.e. the model will be subjected to experimentation in order to have different scenario).Item Modelling and Simulation of Nigerian Airspace Management Agency Billing System Using Python Simulation Packages(American Journal of Mathematical and Computer Modelling, 2020-11-16) Olusanya, Olamide Omolara; Amaikwu, Chinedu Reginald; Oyediran, Mayowa Oyedepo; Elegbede, Adedayo Wasiat; Olusesi, Ayobami TaiwoRevenue generation has a positive and significant effect on the growth of any business. The existing work process in Nigerian Airspace Management Agency (NAMA) billing system creates the loophole for revenue deficit. The need to enhance the billing system of this organization prompted the need for this study. Primary data were collected from NAMA station at Muritala International Airport and its corporate headquarters. The data include the process and time of attending to airlines or their agents (which includes arrival time, service time, departure time, Waiting time etc.), Six months financial statement of NAMA MMIA, Debt profile details for debtors and number of airlines attended to per day. These data formed the input for developing the SimPy model to bring together process based discrete events. Validation was done by comparing the simulated results with the real results using statistical t-test at p less than 0.05 (p<0.05). 15 airlines were considered for 5 months (assuming 30 days per month), making an average of 6 landings per day per route which represents 3 flights within a route per day. The rate is ₦7,000 per one-hour flight per route. The simulation results reveal that with the proposed model ₦23,948,044 was generated as against ₦12,486,680 of the existing system. This represents 191.788% improvement. This result is for Murhitala Muhammed International Airport (local wing) only. The python simulation package (SimPy) used, introduced approval levels for the various department, thereby ensuring no departments’ function was undermined. This model is useful for Airspace management, in that it reduces deficit without any negative impact on the safety and service delivery of airlines.Item Factors Determining the Intention to Use Electronic Health Records: An Extension of the Technology Acceptance Model(Journal of Scientific Research & Reports, 2020-09-23) Okediran, Oladotun O.; Wahab, Wajeed B.; Oyediran, Mayowa O.This paper details an empirical investigation of the factors that determine the intention of adopting and using electronic health records (EHR). The paper’s goal is a study aimed at examining the possibilities and intents towards EHR amongst healthcare professionals in Nigeria. In this study, an extended Technology Acceptance Model (TAM) that incorporates Subjective norm, Social influence, Result demonstrability, Computer self-efficacy and System quality to the original TAM constructs was proposed. The proposed model was empirically tested using data collected from a sample of 126 healthcare professionals across 14 healthcare delivery institutions in Oyo State, Southwestern, Nigeria by applying structural equation modeling (SEM). These data were collected by administering a questionnaire containing 30 items. The results of the evaluation showed that all constructs have significant effect on healthcare professionals’ behavioural intention to use EHR.Item Modeling User Acceptance of Electronic Voting: An Extended Technology Acceptance Model (TAM) Approach(Current Journal of Applied Science and Technology, 2020-09-29) Okediran, Oladotun O.; Oyediran, Mayowa O.; Sijuade1, Adeyemi A.; Wahab, Wajeed B.Election voting has emerged as a significant alternative to conventional voting methods with testimonials of its implementation showing various degrees of success in some countries of the western world. Lately, many developing countries are also looking at its prospects as a replacement or supplement for traditional paper balloting which is, the principal voting method in most of these countries. However, the voting populace’ acceptance of this technology is a major factor that needs to be considered before its actual introduction owning to factors that includes, digital divides, low literacy level, norms and beliefs, high poverty level and so on. From another viewpoint, due to the peculiarity of contextual ICT infrastructural challenges of developing countries, there is a need to investigate the factors that will influence adoption decision and eventual usage when planning to introduce electronic voting so that the evolving system will not end up being impractical for the target users. In this study, an empirical investigation of the factors influencing the adoption decision of electronic voting was carried out. More specifically, this study aimed at examining the possibilities and intents towards mobile voting (which is a type of electronic voting), among a selected sample population of electorates in Nigeria. In the study, an extended Technology Acceptance Model (TAM) that integrates Subjective norm, Perceived compatibility, Perceived privacy, Perceived security, Perceived price value and Perceived trust into the original TAM constructs was proposed. A total of 1364 sample data were collected from a selected population of electorates who had at one time or the other participated in at least an electioneering process in Nigeria. The data was then analyzed statistically using Partial Least Square Structural Equation Modeling (PLS-SEM). The results obtained show that all variables have significant effect on the electorates’ behavioural intention to use mobile voting except for perceived privacy.Item Development of a Matlab Based Pattern Design System for Plain Textile (Ankara)(IOSR Journal of Computer Engineering (IOSR-JCE), 2020-01-03) Elegbede, Adedayo W.; Olusanya, Olamide O.; Oyediran, Mayowa O.; Amole, Abraham O.Textile designing involves producing patterns for cloth used in clothing, household textiles (such as towels) and decorative textiles such as carpets. In the past, numerous printing techniques have been employed in patterning textiles and they give an accurate representation of designs when utilized but designs produced by the conventional method are static and rigid. Hence, MATLAB was used in this work to enable dynamic designs be created for a particular textile material. This work develops patterns for printing different textiles and creating innovative designs using mathematics to serve as instructions for artistic.Item Development of Efficient E-Recruitment System for University Staff in Nigeria(Circulation in Computer Science, 2016-05-05) Amusan, D. G.; Oyediran, M.O.The development of e-recruitment system is web-based tool used in order to reduce communication gap between job seekers and employers. E-recruitment, also known as online recruitment, is the practice of using technology and in particular Web-based resources for tasks involved with finding, attracting, assessing, interviewing and hiring new personnel. Most of the existing mode of recruitment (manual recruitment) takes much time in processing the application form, existing system will not automatically send feedback to all applicant whose meet up with the job requirement but with the help of the developed system there is reduction in time to process the application form and there is automatic feedback from the employer to the job seeker that meet up with requirement. The objective of this work is to developed an efficient e-recruitment system capable of managing all stages of the e- recruitment process, including multi-job posting, agency channel management and candidate filtering to identify the most relevant candidates...Item Hybrid Design using Counter Propagation Neural Network-Genetic Algorithm Model for the Anomaly Detection in Online Transaction(International Journal of Advances in Scientific Research and Engineering (ijasre), 2019-09-20) Amusan, D.G.; Olabode, A.O.; Ojo, O.S.; Folowosele, A.O.; Oyediran, M.O.In e-commerce, credit card fraud is an evolving challenge. The increase in the number of credit card transactions provides more opportunity for fraudsters to steal credit card numbers and execute fraud. Fraud detection is a continuously evolving discipline to tackle ever changing tactics to commit fraud. Existing fraud detection systems have not been so much efficient to reduce fraud transaction rate. Improvement in fraud detection practices has become essential to maintain existence of payment system. This research designed hybrid of Counter Propagation Neural Network and genetic algorithm (CPNN-GA) for the detection of anomaly in any online transactions.Item Design and implementation of a prototype active infrared sensor controlled automatic sliding door for mitigation of coronavirus disease 2019 (COVID-19)(Journal of Electrical, Control and Telecommunication Research, 2020-04-01) Amole, A. O.; Oyediran, M. O.; Olusanya, O. O.; Elegbede, W. A.; Olusesi, A. T.; Adeleye, A. O.The door is an essential part of any structure that provides access and security of lives and properties. The manual operation of a door could be cumbersome and laborious when the traffic volume is high. Also, it has been observed that doors could serve as a medium of spreading the deadly coronavirus disease 2019 (COVID-19) infection. Therefore, a prototype automatic sliding door that plays a crucial role in curbing the spread of this infectious diseases has been designed and implemented in this paper. The design of the prototype sliding door is in two parts namely; the structural part and the automation part. The structural design of the door was achieved using the Microsoft Visio 2016 while the design of the automation system was achieved using express printed circuit board. The implementation of the structural part was achieved using 1 inch particle board while the implementation of the automation system was based on the components like the active infrared sensor, resistors (10 kΩ), capacitor (1000 µF), transistors (TIP41 Q8, BC548 Q7), LED indicators, press button switch, pulley system, drive belt, stepper motor (IP65), and ATMEGA 8 microcontroller. The result of the tests carried out on the door showed that the prototype automatic sliding door was characterized by average opening time, closing time, delay time, and optimal sensing range of 3.10 s, 3.05 s, 5.72 s, and 23.5 cm, respectively. It can therefore be concluded from this work that the prototype automatic sliding door is effective in overriding the manual operation of the door.Item AN ENHANCED PRINCIPAL COMPONENT ANALYSIS APPROACH FOR EXTRACTING FEATURES IN PALMPRINT IMAGES(International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE), 2016-09-15) Akande, Noah Oluwatobi; Oyediran, Mayowa Oyedepo; Ogundokun, Roseline Oluwaseun; Adeyemo, Isiaka AkinkunmiIn reducing the dimensions of feature space so as to achieve better performance, minimal features that yet represent the original image maximally need to be extracted. Principal Component Analysis (PCA) which is an appearance based projection method has been widely used in this regards. Literatures have shown that PCA performs well for dimensionality reduction but instead of reducing within class variations, it increases it therefore resulting in its low performance. In contrast, Independent Component Analysis (ICA) performs preferably well in this instead since it linearly transforms an original data into completely independent components thereby reducing within class variations. While both PCA and ICA have been used for the purpose of feature extraction, no single feature extraction algorithm is exclusively flawless in all ramifications. In lieu of this, this paper introduces an Enhanced Principal Component Analysis (EPCA) approach which first extracts principal components from data and further uses the extracted components as input to an ICA algorithm. The EPCA was employed for feature extraction in a palmprint recognition system. The resultant system was validated using 900 palmprint images which were downloaded from three public palmprint databases. Recognition and verification rates arising from the palmprint recognition system showed that the EPCA performed well than PCA algorithm.Item ADAPTATION AND USABILITY OF QUICK RESPONSE CODES FOR SUBSCRIPTION TO MOBILE NETWORK OPERATORS’ SERVICES(Anale. Seria Informatică., 2018-03-01) Akande, Noah Oluwatobi; Arulogun, Oladiran Tayo; Oyediran, Mayowa OyedepoMobile Network Operators (MNOs) permit subscribers to gain access to data, voice calls or short messaging services offered by their networks. Payments for any of these services could be via online payments platforms, short codes provided by financial institutions or the acquisition of recharge vouchers. Of these payment methods, the recharge voucher acquisition option remains the most widely used. However, illegal access to the recharge codes has not been totally eradicated and this has marred the recharge vouchers payment method. Therefore, this paper examined and demonstrated the feasibility of employing Quick Response (QR) code as a more secured payment alternative to recharge vouchers. Twitter fabric’s crashlytics tool was used to evaluate the performance of the developed QR code mobile payment method for a three month periods. A successful payment attempt and crash free sessions were experienced among 48 volunteers who used the application in 125 sessions.Item P-ACOHONEYBEE: A Novel Load Balancer for Cloud Computing Using Mathematical Approach(Computers, Materials & Continua, 2022-04-12) Ajagbe, Sunday Adeola; Oyediran, Mayowa O.; Nayyar, Anand; Awokola, Jinmisayo A.; Al-Amri, JehadCloud computing is a collection of disparate resources or services, a web of massive infrastructures, which is aimed at achieving maximum utilization with higher availability at a minimized cost. One of the most attractive applications for cloud computing is the concept of distributed information processing. Security, privacy, energy saving, reliability and load balancing are the major challenges facing cloud computing and most informa tion technology innovations. Load balancing is the process of redistributing workload among all nodes in a network; to improve resource utilization and job response time, while avoiding overloading some nodes when other nodes are underloaded or idle is a major challenge. Thus, this research aims to design a novel load balancing systems in a cloud computing environment. The research is based on the modification of the existing approaches, namely; particle swarm optimization (PSO), honeybee, and ant colony optimization (ACO) with mathematical expression to form a novel approach called P ACOHONEYBEE. The experiments were conducted on response time and throughput. The results of the response time of honeybee, PSO, SASOS, round-robin, PSO-ACO, and P-ACOHONEYBEE are: 2791, 2780, 2784, 2767, 2727, and 2599 (ms) respectively. The outcome of throughput of hon eybee, PSO, SASOS, round-robin, PSO-ACO, and P-ACOHONEYBEE are: 7451, 7425, 7398, 7357, 7387 and 7482 (bps) respectively. It is observed that P-ACOHONEYBEE approach produces the lowest response time, high throughput and overall improved performance for the 10 nodes. The research has helped in managing the imbalance drawback by maximizing throughput, and reducing response time with scalability and reliability.Item Feature Extraction Techniques for Mass Detection in Digital Mammogram (Review)(Journal of Scientific Research & Reports, 2017-12-08) Adeyemo, Temitope Tosin; Adepoju, Temilola Morufat; Sobowale, Adedayo Aladejobi; Oyediran, Mayowa Oyedepo; Omidiora, Elijah Olusayo; Olabiyisi, Stephen OlatudeOne of the most common diseases in women today is breast cancer. The method of detection and analyzing breast images according to literature, to mention few are mammography, magnetic resonance, thermography and ultrasound of which mammography is the most accurate and low cost method. Mass is a major symptom of breast abnormality. Despite the high success of mammography in mass detection, radiologists find it difficult to interpret breast abnormality and take decision. Computer Aided Detection (CADe) and Computer Aided Diagnosis (CADx) are the two systems to improve radiologists’ accuracy of detection and, classification of breast cancer into benign or malignant prior to biopsy. However, the optimal classification rate of CAD system depends on effectiveness of feature extraction technique. This paper present review of different feature extraction Techniques (FETs) that have been adopted for mass detection and classification.Item DESIGN, FABRICATION AND AUTOMATION OF A PALM OIL MILLING MACHINE FOR SUSTAINABLE PALM OIL PRODUCTION(Nigerian Universities for Sustainable Development, 2020) AKPODONOR, IghoK.; OLATUNBOSUN, Adeboye; OBANISOLA, Oluwole O.; OYERINDE, Iretioluwa M.; OLOMO, Olutola O.Item DEVELOPMENT OF A THREE PHASE ISOLATOR WITH SURGE PROTECTOR FOR A THREE PHASE ELECTRIC WATER PUMPING MACHINE(Ajayi Crowther University Press, 2020) OBANISOLA, Oluwole O.; OYERINDE, Iretioluwa M.; AKPODONOR, Igho K.; ADEYEMI, Festus O.This paper presents the development of a protective device for valuable electrical equipment which is worth considering when setting up industries. One of such possible needs is the protection of electrical equipment from the damaging effect of extremely high or low voltage source or faults from mains supply. For the purpose of this research, a three phase isolator is designed to effectively power three phase electric water pumping machine for irrigation purposes and water supply to towns and cities for life sustainability. The incorporation of this device in the input supply circuit to an electric water pumping machine has been found to be of great advantage in ensuring proper functionality of the machine which guarantees constant water supply for sustaining livelihood.