Olusegun O Omitola | Afe Babalola University, Ado-Ekiti (original) (raw)
Uploads
Papers by Olusegun O Omitola
Biometrics can be described as the technology used in identifying or authenticating an individual... more Biometrics can be described as the technology used in identifying or authenticating an individual based on their unique biological features such as iris, signature, and voice. This paper discussed in details the real life implementation, and also the application of iris recognition security system to understand their strength and weakness. It also discussed its security considerations. Iris recognition is regarded as the most reliable and accurate biometric identification system available.
There has been an astronomical increase in the number of educational institutions established esp... more There has been an astronomical increase in the number of educational institutions established especially in the last four decades all over the world. This development has brought education to the doorstep of people. Consequently it has increased knowledge and helped produce a population of enlightened citizens who can easily abide by the rules of civilized society and contribute meaningfully to the process of democratic governance. Most of the newly established educational institutions however, are using the old conventional techniques for managing their assets especially hostel facilities. This old techniques with its inherent limitations have impacted negatively on the overall organisational efficiency of this educational systems. In this paper, the development of an automated hostel accommodation management system is proposed. The codes for the automated system were developed using Visual Basic and Microsoft Access was used to develop the underlying database. It also has in-built...
Image compression can be described as a way of minimizing the size in bytes of a graphics file wi... more Image compression can be described as a way of minimizing the size in bytes of a graphics file without degrading the quality of the image to an unacceptable level. This paper presents the study of image compression using Discrete Cosine Transform (DCT). This work employs DCT method to compress images in other to have high compression ratio and high quality image. However, this study presents a number of merits, namely: reduction in redundancies of the image data so as to transmit data in an efficient form and ability to attach and transfer images over the web or over the network in less time. (
Innovative Systems Design and Engineering, 2014
The performance evaluation of any technology is based on certain parameters such as throughput an... more The performance evaluation of any technology is based on certain parameters such as throughput and delay among others, experienced from one user to the others. The behavior of this technology can be affected by the number of users or nodes and certain generation parameters. This design work is aim to evaluate and investigate the behavior of throughput and delay on two different technologies: Ethernet and FDDI. Using two scenarios with 20 nodes each and design with OPNET-MODELER simulator, the two technologies operate at a speed of 100Mbps. The two scenarios created were analyzed using the result generated from the graph. It was concluded that throughput in Ethernet is greater than that of FDDI and delay experienced by the Ethernet network is more than that of FDDI when the same number of nodes were used.
A mathematical model for pseudo one component adsorption on a fixed bed is developed. The model t... more A mathematical model for pseudo one component adsorption on a fixed bed is developed. The model takes into account of external and internal mass transfer resistances with non ideal plug flow behaviour. In the present study, the Langmuir equilibrium isotherm is used to represent liquid-solid equilibrium relationship. The model consists of a set of couple partial differential equations, and the differential equations representing the mass balances of both fluid and pore phases are solved by the implicit backward Euler finite difference method and compared with previous models reported in literature. The effects of various important and influencing parameters such as flow rate, particle radius and bed porosity in breakthrough curve are studied in detail. Hence, the proposed model is suitable and applicable to study the fixed bed adsorption column performance under isothermal condition.
This work evaluates the effect(s) of common encryption algorithms on throughput, processing time ... more This work evaluates the effect(s) of common encryption algorithms on throughput, processing time and power consumption of a wireless system. Three different encryption algorithms commonly used for wireless local area network (WLANs) namely; Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Blowfish were evaluated and studied. The three algorithms were simulated and compiled using the default settings in .NET 2010 visual studio. The results show that Blowfish algorithm outperforms other algorithms in terms of energy consumption, processing time and throughput for Text data, Audio files and Image files. While DES is optimal both in its throughput and energy requirement.
The performance evaluation of any technology is based on certain parameters such as throughput an... more The performance evaluation of any technology is based on certain parameters such as throughput and delay among others, experienced from one user to the others. The behavior of this technology can be affected by the number of users or nodes and certain generation parameters. This design work is aim to evaluate and investigate the behavior of throughput and delay on two different technologies: Ethernet and FDDI. Using two scenarios with 20 nodes each and design with OPNET-MODELER simulator, the two technologies operate at a speed of 100Mbps. The two scenarios created were analyzed using the result generated from the graph. It was concluded that throughput in Ethernet is greater than that of FDDI and delay experienced by the Ethernet network is more than that of FDDI when the same number of nodes were used. (Keywords: OPNET-Modeler, Ethernet, FDDI, throughput, delay, CSMA/CD, carrier sense multiple access with collision detection)
Technological advancement serves as a major key to a nation's development. On the other hand, pro... more Technological advancement serves as a major key to a nation's development. On the other hand, proper engineering knowledge (acquired through appropriate structures) plays significant roles in the attainment of a high level of technological advancement. Most developing countries find it difficult to impact adequate knowledge and training to engineers at different levels of training. An overview of the problems confronting engineering education, and factors that affects engineering education in Nigeria is taken in this paper. The paper identifies lack of adequate or competent human resources, government attitude towards vocational education or technological development in term of funding, poor maintenance, lack of relevant adequate infrastructures, and political situation as the dominant problems faced by engineering education in Nigeria. The paper, in addition to finding solutions to the above problems, recommends proper care in admitting students, infrastructural inadequacy needs to be recognized and properly articulated with a view to being redressed, appropriate government policy and disposition and intervention of professional and international bodies (through provision of financial and material assistance) for assisting in the training and practice of engineers in Nigeria and in order that the country may achieve meaningful development comparable with foreign countries.
This work evaluates the performance of three well known routing protocols in mobile ad-hoc networ... more This work evaluates the performance of three well known routing protocols in mobile ad-hoc networks, namely Ad-hoc On
demand Distance Vector Protocol (AODV), Dynamic Source Routing (DSR) and Temporally Ordered Routing Algorithm
(TORA). Two scenarios were created using OPNET and extensive simulations were made on each scenario to evaluate the
performance of the three protocols. Results were presented as a function of three performance metrics namely: throughput, delay
and network load. In most simulations and overall, DSR and AODV performed better than TORA while DSR shows a better
performance compare to AODV. In terms of throughput, DSR is better than any of the other two protocols for both scenarios
while AODV shows a better result in delay than DSR and TORA. The lowest value of network load is generated in both
scenarios when TORA is used than when any of DSR and AODV is used. Thus, DSR because of its highest value of throughput
outperformed others, followed by AODV and then TORA.
Wireless Sensor Network, 2013
The purpose of this project is to design and construct a 1000Watts (1KW) 220 Volts Inverter at a ... more The purpose of this project is to design and construct a 1000Watts (1KW) 220 Volts Inverter at a frequency of 50Hz. This device is constructed with locally sourced components and materials of regulated standards. The basic principle of its operation is a simple conversion of 12V DC from a battery using integrated circuits and semiconductors at a frequency of 50Hz, to a 220V AC across the windings of a transformer. An additional power supply to the public power supply with the same power output is thus provided at an affordable price.
Biometrics can be described as the technology used in identifying or authenticating an individual... more Biometrics can be described as the technology used in identifying or authenticating an individual based on their unique biological features such as iris, signature, and voice. This paper discussed in details the real life implementation, and also the application of iris recognition security system to understand their strength and weakness. It also discussed its security considerations. Iris recognition is regarded as the most reliable and accurate biometric identification system available.
There has been an astronomical increase in the number of educational institutions established esp... more There has been an astronomical increase in the number of educational institutions established especially in the last four decades all over the world. This development has brought education to the doorstep of people. Consequently it has increased knowledge and helped produce a population of enlightened citizens who can easily abide by the rules of civilized society and contribute meaningfully to the process of democratic governance. Most of the newly established educational institutions however, are using the old conventional techniques for managing their assets especially hostel facilities. This old techniques with its inherent limitations have impacted negatively on the overall organisational efficiency of this educational systems. In this paper, the development of an automated hostel accommodation management system is proposed. The codes for the automated system were developed using Visual Basic and Microsoft Access was used to develop the underlying database. It also has in-built...
Image compression can be described as a way of minimizing the size in bytes of a graphics file wi... more Image compression can be described as a way of minimizing the size in bytes of a graphics file without degrading the quality of the image to an unacceptable level. This paper presents the study of image compression using Discrete Cosine Transform (DCT). This work employs DCT method to compress images in other to have high compression ratio and high quality image. However, this study presents a number of merits, namely: reduction in redundancies of the image data so as to transmit data in an efficient form and ability to attach and transfer images over the web or over the network in less time. (
Innovative Systems Design and Engineering, 2014
The performance evaluation of any technology is based on certain parameters such as throughput an... more The performance evaluation of any technology is based on certain parameters such as throughput and delay among others, experienced from one user to the others. The behavior of this technology can be affected by the number of users or nodes and certain generation parameters. This design work is aim to evaluate and investigate the behavior of throughput and delay on two different technologies: Ethernet and FDDI. Using two scenarios with 20 nodes each and design with OPNET-MODELER simulator, the two technologies operate at a speed of 100Mbps. The two scenarios created were analyzed using the result generated from the graph. It was concluded that throughput in Ethernet is greater than that of FDDI and delay experienced by the Ethernet network is more than that of FDDI when the same number of nodes were used.
A mathematical model for pseudo one component adsorption on a fixed bed is developed. The model t... more A mathematical model for pseudo one component adsorption on a fixed bed is developed. The model takes into account of external and internal mass transfer resistances with non ideal plug flow behaviour. In the present study, the Langmuir equilibrium isotherm is used to represent liquid-solid equilibrium relationship. The model consists of a set of couple partial differential equations, and the differential equations representing the mass balances of both fluid and pore phases are solved by the implicit backward Euler finite difference method and compared with previous models reported in literature. The effects of various important and influencing parameters such as flow rate, particle radius and bed porosity in breakthrough curve are studied in detail. Hence, the proposed model is suitable and applicable to study the fixed bed adsorption column performance under isothermal condition.
This work evaluates the effect(s) of common encryption algorithms on throughput, processing time ... more This work evaluates the effect(s) of common encryption algorithms on throughput, processing time and power consumption of a wireless system. Three different encryption algorithms commonly used for wireless local area network (WLANs) namely; Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Blowfish were evaluated and studied. The three algorithms were simulated and compiled using the default settings in .NET 2010 visual studio. The results show that Blowfish algorithm outperforms other algorithms in terms of energy consumption, processing time and throughput for Text data, Audio files and Image files. While DES is optimal both in its throughput and energy requirement.
The performance evaluation of any technology is based on certain parameters such as throughput an... more The performance evaluation of any technology is based on certain parameters such as throughput and delay among others, experienced from one user to the others. The behavior of this technology can be affected by the number of users or nodes and certain generation parameters. This design work is aim to evaluate and investigate the behavior of throughput and delay on two different technologies: Ethernet and FDDI. Using two scenarios with 20 nodes each and design with OPNET-MODELER simulator, the two technologies operate at a speed of 100Mbps. The two scenarios created were analyzed using the result generated from the graph. It was concluded that throughput in Ethernet is greater than that of FDDI and delay experienced by the Ethernet network is more than that of FDDI when the same number of nodes were used. (Keywords: OPNET-Modeler, Ethernet, FDDI, throughput, delay, CSMA/CD, carrier sense multiple access with collision detection)
Technological advancement serves as a major key to a nation's development. On the other hand, pro... more Technological advancement serves as a major key to a nation's development. On the other hand, proper engineering knowledge (acquired through appropriate structures) plays significant roles in the attainment of a high level of technological advancement. Most developing countries find it difficult to impact adequate knowledge and training to engineers at different levels of training. An overview of the problems confronting engineering education, and factors that affects engineering education in Nigeria is taken in this paper. The paper identifies lack of adequate or competent human resources, government attitude towards vocational education or technological development in term of funding, poor maintenance, lack of relevant adequate infrastructures, and political situation as the dominant problems faced by engineering education in Nigeria. The paper, in addition to finding solutions to the above problems, recommends proper care in admitting students, infrastructural inadequacy needs to be recognized and properly articulated with a view to being redressed, appropriate government policy and disposition and intervention of professional and international bodies (through provision of financial and material assistance) for assisting in the training and practice of engineers in Nigeria and in order that the country may achieve meaningful development comparable with foreign countries.
This work evaluates the performance of three well known routing protocols in mobile ad-hoc networ... more This work evaluates the performance of three well known routing protocols in mobile ad-hoc networks, namely Ad-hoc On
demand Distance Vector Protocol (AODV), Dynamic Source Routing (DSR) and Temporally Ordered Routing Algorithm
(TORA). Two scenarios were created using OPNET and extensive simulations were made on each scenario to evaluate the
performance of the three protocols. Results were presented as a function of three performance metrics namely: throughput, delay
and network load. In most simulations and overall, DSR and AODV performed better than TORA while DSR shows a better
performance compare to AODV. In terms of throughput, DSR is better than any of the other two protocols for both scenarios
while AODV shows a better result in delay than DSR and TORA. The lowest value of network load is generated in both
scenarios when TORA is used than when any of DSR and AODV is used. Thus, DSR because of its highest value of throughput
outperformed others, followed by AODV and then TORA.
Wireless Sensor Network, 2013
The purpose of this project is to design and construct a 1000Watts (1KW) 220 Volts Inverter at a ... more The purpose of this project is to design and construct a 1000Watts (1KW) 220 Volts Inverter at a frequency of 50Hz. This device is constructed with locally sourced components and materials of regulated standards. The basic principle of its operation is a simple conversion of 12V DC from a battery using integrated circuits and semiconductors at a frequency of 50Hz, to a 220V AC across the windings of a transformer. An additional power supply to the public power supply with the same power output is thus provided at an affordable price.