Olusegun O Omitola | Afe Babalola University, Ado-Ekiti (original) (raw)

Uploads

Papers by Olusegun O Omitola

Research paper thumbnail of An ontology-based system for chronic tropical diseases using the Prot?g?-OWL tool

Research paper thumbnail of Iris Recognition Technology: Implementation, Application, and Security Consideration

Biometrics can be described as the technology used in identifying or authenticating an individual... more Biometrics can be described as the technology used in identifying or authenticating an individual based on their unique biological features such as iris, signature, and voice. This paper discussed in details the real life implementation, and also the application of iris recognition security system to understand their strength and weakness. It also discussed its security considerations. Iris recognition is regarded as the most reliable and accurate biometric identification system available.

Research paper thumbnail of Development of an Automated Hostel Facility Management System

There has been an astronomical increase in the number of educational institutions established esp... more There has been an astronomical increase in the number of educational institutions established especially in the last four decades all over the world. This development has brought education to the doorstep of people. Consequently it has increased knowledge and helped produce a population of enlightened citizens who can easily abide by the rules of civilized society and contribute meaningfully to the process of democratic governance. Most of the newly established educational institutions however, are using the old conventional techniques for managing their assets especially hostel facilities. This old techniques with its inherent limitations have impacted negatively on the overall organisational efficiency of this educational systems. In this paper, the development of an automated hostel accommodation management system is proposed. The codes for the automated system were developed using Visual Basic and Microsoft Access was used to develop the underlying database. It also has in-built...

Research paper thumbnail of Empirical Study of Discrete Cosine Transform on Image Compression

Image compression can be described as a way of minimizing the size in bytes of a graphics file wi... more Image compression can be described as a way of minimizing the size in bytes of a graphics file without degrading the quality of the image to an unacceptable level. This paper presents the study of image compression using Discrete Cosine Transform (DCT). This work employs DCT method to compress images in other to have high compression ratio and high quality image. However, this study presents a number of merits, namely: reduction in redundancies of the image data so as to transmit data in an efficient form and ability to attach and transfer images over the web or over the network in less time. (

Research paper thumbnail of Design and Construction of 1KW (1000VA) Power Inverter

Innovative Systems Design and Engineering, 2014

Research paper thumbnail of Evaluation and Investigation of Throughput and Delay on Ethernet and FDDI Technologies using OPNET

The performance evaluation of any technology is based on certain parameters such as throughput an... more The performance evaluation of any technology is based on certain parameters such as throughput and delay among others, experienced from one user to the others. The behavior of this technology can be affected by the number of users or nodes and certain generation parameters. This design work is aim to evaluate and investigate the behavior of throughput and delay on two different technologies: Ethernet and FDDI. Using two scenarios with 20 nodes each and design with OPNET-MODELER simulator, the two technologies operate at a speed of 100Mbps. The two scenarios created were analyzed using the result generated from the graph. It was concluded that throughput in Ethernet is greater than that of FDDI and delay experienced by the Ethernet network is more than that of FDDI when the same number of nodes were used.

Research paper thumbnail of Mathematical Modelling of Fixed Bed Adsorption Column for Liquid Phase Solute: Effect of Operating Variables

A mathematical model for pseudo one component adsorption on a fixed bed is developed. The model t... more A mathematical model for pseudo one component adsorption on a fixed bed is developed. The model takes into account of external and internal mass transfer resistances with non ideal plug flow behaviour. In the present study, the Langmuir equilibrium isotherm is used to represent liquid-solid equilibrium relationship. The model consists of a set of couple partial differential equations, and the differential equations representing the mass balances of both fluid and pore phases are solved by the implicit backward Euler finite difference method and compared with previous models reported in literature. The effects of various important and influencing parameters such as flow rate, particle radius and bed porosity in breakthrough curve are studied in detail. Hence, the proposed model is suitable and applicable to study the fixed bed adsorption column performance under isothermal condition.

Research paper thumbnail of Performance Evaluation of Common Encryption Algorithms for Throughput and Energy Consumption of a Wireless System

This work evaluates the effect(s) of common encryption algorithms on throughput, processing time ... more This work evaluates the effect(s) of common encryption algorithms on throughput, processing time and power consumption of a wireless system. Three different encryption algorithms commonly used for wireless local area network (WLANs) namely; Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Blowfish were evaluated and studied. The three algorithms were simulated and compiled using the default settings in .NET 2010 visual studio. The results show that Blowfish algorithm outperforms other algorithms in terms of energy consumption, processing time and throughput for Text data, Audio files and Image files. While DES is optimal both in its throughput and energy requirement.

Research paper thumbnail of Evaluation and Investigation of Throughput and Delay on Ethernet and FDDI Technologies using OPNET

The performance evaluation of any technology is based on certain parameters such as throughput an... more The performance evaluation of any technology is based on certain parameters such as throughput and delay among others, experienced from one user to the others. The behavior of this technology can be affected by the number of users or nodes and certain generation parameters. This design work is aim to evaluate and investigate the behavior of throughput and delay on two different technologies: Ethernet and FDDI. Using two scenarios with 20 nodes each and design with OPNET-MODELER simulator, the two technologies operate at a speed of 100Mbps. The two scenarios created were analyzed using the result generated from the graph. It was concluded that throughput in Ethernet is greater than that of FDDI and delay experienced by the Ethernet network is more than that of FDDI when the same number of nodes were used. (Keywords: OPNET-Modeler, Ethernet, FDDI, throughput, delay, CSMA/CD, carrier sense multiple access with collision detection)

Research paper thumbnail of Towards Arresting the Decline in Academic Standards of Engineering Education in Nigerian University

Technological advancement serves as a major key to a nation's development. On the other hand, pro... more Technological advancement serves as a major key to a nation's development. On the other hand, proper engineering knowledge (acquired through appropriate structures) plays significant roles in the attainment of a high level of technological advancement. Most developing countries find it difficult to impact adequate knowledge and training to engineers at different levels of training. An overview of the problems confronting engineering education, and factors that affects engineering education in Nigeria is taken in this paper. The paper identifies lack of adequate or competent human resources, government attitude towards vocational education or technological development in term of funding, poor maintenance, lack of relevant adequate infrastructures, and political situation as the dominant problems faced by engineering education in Nigeria. The paper, in addition to finding solutions to the above problems, recommends proper care in admitting students, infrastructural inadequacy needs to be recognized and properly articulated with a view to being redressed, appropriate government policy and disposition and intervention of professional and international bodies (through provision of financial and material assistance) for assisting in the training and practice of engineers in Nigeria and in order that the country may achieve meaningful development comparable with foreign countries.

Research paper thumbnail of Performance Evaluation of Routing Protocols in MANETs using Varying Number of Nodes and Different Metrics

This work evaluates the performance of three well known routing protocols in mobile ad-hoc networ... more This work evaluates the performance of three well known routing protocols in mobile ad-hoc networks, namely Ad-hoc On
demand Distance Vector Protocol (AODV), Dynamic Source Routing (DSR) and Temporally Ordered Routing Algorithm
(TORA). Two scenarios were created using OPNET and extensive simulations were made on each scenario to evaluate the
performance of the three protocols. Results were presented as a function of three performance metrics namely: throughput, delay
and network load. In most simulations and overall, DSR and AODV performed better than TORA while DSR shows a better
performance compare to AODV. In terms of throughput, DSR is better than any of the other two protocols for both scenarios
while AODV shows a better result in delay than DSR and TORA. The lowest value of network load is generated in both
scenarios when TORA is used than when any of DSR and AODV is used. Thus, DSR because of its highest value of throughput
outperformed others, followed by AODV and then TORA.

Research paper thumbnail of A Simulation-Based Performance Evaluation of AODV and DSR in Mobile Ad-Hoc Networks (MANETs)

Research paper thumbnail of Design and Implementation of Remotely Controlled Vehicle Anti-Theft System via GSM Network

Wireless Sensor Network, 2013

Research paper thumbnail of Design and Construction of 1KW (1000VA) Power Inverter

The purpose of this project is to design and construct a 1000Watts (1KW) 220 Volts Inverter at a ... more The purpose of this project is to design and construct a 1000Watts (1KW) 220 Volts Inverter at a frequency of 50Hz. This device is constructed with locally sourced components and materials of regulated standards. The basic principle of its operation is a simple conversion of 12V DC from a battery using integrated circuits and semiconductors at a frequency of 50Hz, to a 220V AC across the windings of a transformer. An additional power supply to the public power supply with the same power output is thus provided at an affordable price.

Research paper thumbnail of Development of an Electronic Commerce WEB Application

Research paper thumbnail of Iris Recognition Technology: Implementation, Application, and Security Consideration.

Research paper thumbnail of An ontology-based system for chronic tropical diseases using the Prot?g?-OWL tool

Research paper thumbnail of Iris Recognition Technology: Implementation, Application, and Security Consideration

Biometrics can be described as the technology used in identifying or authenticating an individual... more Biometrics can be described as the technology used in identifying or authenticating an individual based on their unique biological features such as iris, signature, and voice. This paper discussed in details the real life implementation, and also the application of iris recognition security system to understand their strength and weakness. It also discussed its security considerations. Iris recognition is regarded as the most reliable and accurate biometric identification system available.

Research paper thumbnail of Development of an Automated Hostel Facility Management System

There has been an astronomical increase in the number of educational institutions established esp... more There has been an astronomical increase in the number of educational institutions established especially in the last four decades all over the world. This development has brought education to the doorstep of people. Consequently it has increased knowledge and helped produce a population of enlightened citizens who can easily abide by the rules of civilized society and contribute meaningfully to the process of democratic governance. Most of the newly established educational institutions however, are using the old conventional techniques for managing their assets especially hostel facilities. This old techniques with its inherent limitations have impacted negatively on the overall organisational efficiency of this educational systems. In this paper, the development of an automated hostel accommodation management system is proposed. The codes for the automated system were developed using Visual Basic and Microsoft Access was used to develop the underlying database. It also has in-built...

Research paper thumbnail of Empirical Study of Discrete Cosine Transform on Image Compression

Image compression can be described as a way of minimizing the size in bytes of a graphics file wi... more Image compression can be described as a way of minimizing the size in bytes of a graphics file without degrading the quality of the image to an unacceptable level. This paper presents the study of image compression using Discrete Cosine Transform (DCT). This work employs DCT method to compress images in other to have high compression ratio and high quality image. However, this study presents a number of merits, namely: reduction in redundancies of the image data so as to transmit data in an efficient form and ability to attach and transfer images over the web or over the network in less time. (

Research paper thumbnail of Design and Construction of 1KW (1000VA) Power Inverter

Innovative Systems Design and Engineering, 2014

Research paper thumbnail of Evaluation and Investigation of Throughput and Delay on Ethernet and FDDI Technologies using OPNET

The performance evaluation of any technology is based on certain parameters such as throughput an... more The performance evaluation of any technology is based on certain parameters such as throughput and delay among others, experienced from one user to the others. The behavior of this technology can be affected by the number of users or nodes and certain generation parameters. This design work is aim to evaluate and investigate the behavior of throughput and delay on two different technologies: Ethernet and FDDI. Using two scenarios with 20 nodes each and design with OPNET-MODELER simulator, the two technologies operate at a speed of 100Mbps. The two scenarios created were analyzed using the result generated from the graph. It was concluded that throughput in Ethernet is greater than that of FDDI and delay experienced by the Ethernet network is more than that of FDDI when the same number of nodes were used.

Research paper thumbnail of Mathematical Modelling of Fixed Bed Adsorption Column for Liquid Phase Solute: Effect of Operating Variables

A mathematical model for pseudo one component adsorption on a fixed bed is developed. The model t... more A mathematical model for pseudo one component adsorption on a fixed bed is developed. The model takes into account of external and internal mass transfer resistances with non ideal plug flow behaviour. In the present study, the Langmuir equilibrium isotherm is used to represent liquid-solid equilibrium relationship. The model consists of a set of couple partial differential equations, and the differential equations representing the mass balances of both fluid and pore phases are solved by the implicit backward Euler finite difference method and compared with previous models reported in literature. The effects of various important and influencing parameters such as flow rate, particle radius and bed porosity in breakthrough curve are studied in detail. Hence, the proposed model is suitable and applicable to study the fixed bed adsorption column performance under isothermal condition.

Research paper thumbnail of Performance Evaluation of Common Encryption Algorithms for Throughput and Energy Consumption of a Wireless System

This work evaluates the effect(s) of common encryption algorithms on throughput, processing time ... more This work evaluates the effect(s) of common encryption algorithms on throughput, processing time and power consumption of a wireless system. Three different encryption algorithms commonly used for wireless local area network (WLANs) namely; Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Blowfish were evaluated and studied. The three algorithms were simulated and compiled using the default settings in .NET 2010 visual studio. The results show that Blowfish algorithm outperforms other algorithms in terms of energy consumption, processing time and throughput for Text data, Audio files and Image files. While DES is optimal both in its throughput and energy requirement.

Research paper thumbnail of Evaluation and Investigation of Throughput and Delay on Ethernet and FDDI Technologies using OPNET

The performance evaluation of any technology is based on certain parameters such as throughput an... more The performance evaluation of any technology is based on certain parameters such as throughput and delay among others, experienced from one user to the others. The behavior of this technology can be affected by the number of users or nodes and certain generation parameters. This design work is aim to evaluate and investigate the behavior of throughput and delay on two different technologies: Ethernet and FDDI. Using two scenarios with 20 nodes each and design with OPNET-MODELER simulator, the two technologies operate at a speed of 100Mbps. The two scenarios created were analyzed using the result generated from the graph. It was concluded that throughput in Ethernet is greater than that of FDDI and delay experienced by the Ethernet network is more than that of FDDI when the same number of nodes were used. (Keywords: OPNET-Modeler, Ethernet, FDDI, throughput, delay, CSMA/CD, carrier sense multiple access with collision detection)

Research paper thumbnail of Towards Arresting the Decline in Academic Standards of Engineering Education in Nigerian University

Technological advancement serves as a major key to a nation's development. On the other hand, pro... more Technological advancement serves as a major key to a nation's development. On the other hand, proper engineering knowledge (acquired through appropriate structures) plays significant roles in the attainment of a high level of technological advancement. Most developing countries find it difficult to impact adequate knowledge and training to engineers at different levels of training. An overview of the problems confronting engineering education, and factors that affects engineering education in Nigeria is taken in this paper. The paper identifies lack of adequate or competent human resources, government attitude towards vocational education or technological development in term of funding, poor maintenance, lack of relevant adequate infrastructures, and political situation as the dominant problems faced by engineering education in Nigeria. The paper, in addition to finding solutions to the above problems, recommends proper care in admitting students, infrastructural inadequacy needs to be recognized and properly articulated with a view to being redressed, appropriate government policy and disposition and intervention of professional and international bodies (through provision of financial and material assistance) for assisting in the training and practice of engineers in Nigeria and in order that the country may achieve meaningful development comparable with foreign countries.

Research paper thumbnail of Performance Evaluation of Routing Protocols in MANETs using Varying Number of Nodes and Different Metrics

This work evaluates the performance of three well known routing protocols in mobile ad-hoc networ... more This work evaluates the performance of three well known routing protocols in mobile ad-hoc networks, namely Ad-hoc On
demand Distance Vector Protocol (AODV), Dynamic Source Routing (DSR) and Temporally Ordered Routing Algorithm
(TORA). Two scenarios were created using OPNET and extensive simulations were made on each scenario to evaluate the
performance of the three protocols. Results were presented as a function of three performance metrics namely: throughput, delay
and network load. In most simulations and overall, DSR and AODV performed better than TORA while DSR shows a better
performance compare to AODV. In terms of throughput, DSR is better than any of the other two protocols for both scenarios
while AODV shows a better result in delay than DSR and TORA. The lowest value of network load is generated in both
scenarios when TORA is used than when any of DSR and AODV is used. Thus, DSR because of its highest value of throughput
outperformed others, followed by AODV and then TORA.

Research paper thumbnail of A Simulation-Based Performance Evaluation of AODV and DSR in Mobile Ad-Hoc Networks (MANETs)

Research paper thumbnail of Design and Implementation of Remotely Controlled Vehicle Anti-Theft System via GSM Network

Wireless Sensor Network, 2013

Research paper thumbnail of Design and Construction of 1KW (1000VA) Power Inverter

The purpose of this project is to design and construct a 1000Watts (1KW) 220 Volts Inverter at a ... more The purpose of this project is to design and construct a 1000Watts (1KW) 220 Volts Inverter at a frequency of 50Hz. This device is constructed with locally sourced components and materials of regulated standards. The basic principle of its operation is a simple conversion of 12V DC from a battery using integrated circuits and semiconductors at a frequency of 50Hz, to a 220V AC across the windings of a transformer. An additional power supply to the public power supply with the same power output is thus provided at an affordable price.

Research paper thumbnail of Development of an Electronic Commerce WEB Application

Research paper thumbnail of Iris Recognition Technology: Implementation, Application, and Security Consideration.