Oyenike M . Olanrewaju | Federal University, Dutsin-Ma, (original) (raw)
Papers by Oyenike M . Olanrewaju
International Journal of Computer Applications, 2017
In recent times, it has been discovered that fuzzy logic is an important tool for effective traff... more In recent times, it has been discovered that fuzzy logic is an important tool for effective traffic control system. Research on intelligent traffic systems has revealed that the implementation of linguistic variables in fuzzy systems help in taking care of diverse possible decisions that can be taken by humans in traffic control. However, the majority of these works focus on vehicular traffic without adequate consideration for pedestrian crossings. This research therefore focuses on incorporation of pedestrian crossing variables into vehicular traffic control using fuzzy logic.
A wireless Ad-hoc network consists of wireless nodes communicating without the need for a central... more A wireless Ad-hoc network consists of wireless nodes communicating without the need for a centralized administration; all nodes potentially contribute to the routing process. The fragile and temporary nature of mobile ad-hoc connectivity makes quality of service a crucial issue. In this paper, mobile ad-hoc wireless network of 25 nodes were modelled using Riverbed Modeller for the purpose of evaluating quality of service performance of different queuing policies. The simulation results of four different scenarios of wireless ad hoc networks were reported. The quality of service of the different queuing policies were evaluated in terms of traffic received, network delay and throughput. In this simulation environment, priority queue and Weighted Fair Queuing (WFQ) scheduling performs better than First In First Out (FIFO) and custom queuing scheduling in terms of traffic received. On the other hand, Wireless Local Area Network (WLAN) delay in FIFO and Custom queuing scheduling is less ...
Over the years, devices and the use of networks has grown by leaps and bounds thereby making the ... more Over the years, devices and the use of networks has grown by leaps and bounds thereby making the Dynamic Host Configuration Protocol (DHCP) a very important network management tool. Initially, the protocol focused more on ease of use rather than security, which made it vulnerable to attacks like DHCP starvation among others. There are techniques which have been developed over the years to mitigate attacks to the DHCP server. This research used DHCP snooping to mitigate the attack to achieve a more secured network. The experiment was done in a virtual environment using GNS3. Due to the type of malicious packets that was generated during attack, the LAN was isolated from the Internet to avoid any destruction. The experiment demonstrated how easy it was to attack and exhaust DHCP pool of address thereby prohibited the legitimate client from getting IP address. The research also demonstrated the mitigation of DHCP starvation attack by using DHCP snooping.
A wireless Ad-hoc network consists of wireless nodes communicating without the need for a central... more A wireless Ad-hoc network consists of wireless nodes communicating without the need for a centralized administration; all nodes potentially contribute to the routing process. In this paper, the quality of service of ad-hoc wireless network was analyzed based on different queuing policy. The simulation results of four different scenarios of wireless ad hoc networks having twenty five nodes were reported. The quality of service of the proposed network are evaluated in terms of traffic received, network delay and throughput using OPNET simulator. Data rate of 2Mbps and simulation time of 15 minutes were taken. In this simulation environment, priority queue and weighted queue scheduling performs better than FIFO and custom queuing scheduling in terms of traffic received. On the other hand, WLAN delay in FIFO and custom queuing scheduling is less than that of Priority queuing scheduling.
Global journal of computer science and technology, 2016
The time when someone can do real, publishable mathematics completely without the aid of a comput... more The time when someone can do real, publishable mathematics completely without the aid of a computer is coming to a close; the use of computers in mathematical research is both widespread and under-acknowledged. Mathematicians use computers in a number of ways. This paper highlights the importance of mathematics and digital age in today’s technological advancement; it also explains the influence of digital age on Mathematics research. Key areas where Information and Communication Technology can be applied to Mathematical research are discussed. To demonstrate the use of computer program on Mathematical analysis, some problems were solved analytically and were also solved using computer programs (Mathlab and Python). These two procedures are compared and it is clearly shown that using computer packages to solve Mathematical problems are more efficient, easier and accurate.
As computers move from the desktop, to the palm top, and onto our bodies and into our everyday li... more As computers move from the desktop, to the palm top, and onto our bodies and into our everyday lives, infinite opportunities arise to realize various applications that have never before been possible. As wearable technologies such as the Google Glass, Earbuds are developed and released to the public, health problems resulting from volume of rays that are penetrating human bodies through the signal emissions from these devices must be acknowledged and accounted for. This paper presents wearable computer devices their uses, hazards and the need for the adoption of global safety standards in order to make them safe for users. It also proposed a framework for evaluating the safety use of the wearable devices.
International Journal of Research and Innovation in Applied Science, 2021
Transmission control protocol (TCP) provides a reliable data transfer in all end-to-end data stre... more Transmission control protocol (TCP) provides a reliable data transfer in all end-to-end data stream services on the internet. There are some mechanisms that TCP has that make it suitable for this purpose. Over the years, there have been modifications in TCP algorithms starting from the basic TCP that has only slow-start and congestion avoidance algorithm to the modifications and additions of new algorithms. Today, TCP comes in various variants which include TCP Tahoe, Reno, new reno, vegas, sack etc. Each of this TCP variant has its peculiarities, merits and demerits. This paper is a review of four TCP variants, they are: TCP tahoe, Reno, new reno and vegas, their congestion avoidance algorithms, and possible future research areas.
Routers (sometimes gateways) are important devices in internetworks. Routers play the task of int... more Routers (sometimes gateways) are important devices in internetworks. Routers play the task of interconnecting and partly securing network devices by forwarding packets from source address to destination address. Security on routers is achieved by determining whether packets to be forwarded are authorized to get to their desired destination. This action can be carried out by exploiting misconfigured ACL (Access Control List). ACL is a list of rules that determine whether and how to forward or discard a packet on a network i.e. it filters packets. ACL can also be used for implementing network policies such as NAT (Network address Translation). A correct ACL configured on a router examines each packet to determine whether to forward or drop the packet, this decision is based on the rules specified within the access lists leading to secure network and packet flow. In corporate organizations sometimes there is an interconnection between various LANs but not all devices are allowed to acc...
FUDMA Journal of Sciences (FJS) ISSN online: 2616-1370 ISSN print: 2645 – 2944 Vol. 3 No. 3, September, 2019, pp 264 –269, 2019
Routers (sometimes gateways) are important devices in internetworks. Routers play the task of int... more Routers (sometimes gateways) are important devices in internetworks. Routers play the task of interconnecting and partly securing network devices by forwarding packets from source address to destination address. Security on routers is achieved by determining whether packets to be forwarded are authorized to get to their desired destination. This action can be carried out by exploiting misconfigured ACL (Access Control List). ACL is a list of rules that determine whether and how to forward or discard a packet on a network i.e. it filters packets. ACL can also be used for implementing network policies such as NAT (Network address Translation). A correct ACL configured on a router examines each packet to determine whether to forward or drop the packet, this decision is based on the rules specified within the access lists leading to secure network and packet flow. In corporate organizations sometimes there is an interconnection between various LANs but not all devices are allowed to access a device on particular LAN because of the nature of the resources on that device, hence in such scenario ACL is a good choice when looking for the appropriate tool to control the device access. In this paper we have designed a model of a corporate network with 3 Local Area Networks (LANs), and packets traverse the devices on the LANs). After applying the correct ACL configurations on the LAN 2 Router access is restricted on LAN 2 server, which now only receives packets from an authorized device, this greatly enhances the security of the LAN.
International Journal of Engineering Research & Technology (IJERT) Vol. 3 Issue 8, pp 586-595; ISSN: 2278-0181 , 2014
The advent of mobile Information and Communication Technology (ICT) has recorded a steady growth ... more The advent of mobile Information and Communication Technology (ICT) has recorded a steady growth rate over the past decade but has however given way to something greater and a more alarming increase in the rate of internet insecurity and cybercrime in Nigeria. It is therefore no wonder that crimes like mail scams, phishing, identity theft and privacy intrusion among others are on the increase in the country. Although some efforts have been made in the past to reduce the incidence of these cybercrimes, it is quite obvious that the high demand on mobile ICT and their numerous benefits are been played upon to the detriment of innocent people. This paper discusses the current internet security situation and the direct impact of mobile information and communication technologies on cybercrime in Nigeria and as well proffer solutions.
Proceedings of 4th International Conference on Information Technology in Education and Development 2021, Abuja. Pp126-132, 2021
sIn a relatively small network (one or two switches), switches achieve communication (forwarding ... more sIn a relatively small network (one or two switches), switches achieve communication (forwarding of frames) between each other seamlessly. It is a common practice to interconnect switches for redundancy. When switches are interconnected, it is usually difficult for the network to completely fail even if one of the connected links fails. When switches are interconnected to achieve redundancy, a serious network problem or challenge is bound to happen which is, the time required to re-converge such a network when a link fails or when there is a major change in the network topology. This paper presents a mechanism at layer2 segment of a network to achieve sub-second convergence when a failure occurs. The approach will be the use of layer3 switches that support dynamic routing algorithms to achieve link-state-advertisement between participating switches. This way, individual switches will not have to rely on other switches to forward a frame since each switch has an updated database of the current network topology. The results of the simulation clearly shows that the use of routing protocol (OSPF) at layer2 contributed greatly towards achieving sub-second converge and avoiding layer2 loops
Proceedings of Information Technology in Education and Development, 2020
Despite the fact that many research works have been done on the way to securing documents on webs... more Despite the fact that many research works have been done on the way to securing documents on websites, attackers are day by day finding means of detecting a way to break all the security methods. One of the ways of these prevention is Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) which is used to protect websites such as E-mail providers, social networks, and online business from unauthorized user. This research work reviewed major text CAPTCHA in existence, and proposed an Enhanced CAPTCHA based authentication using Mathematical operation to provide solutions to most common problem of the existing ones such as inlegibility of character and easy penetration by smart robots. The proposed system based the authentication on random mathematics expression with alteration in the operator for the user to respond to the challenge by supplying the correct answer. The implementation was developed using Visual Basic 2010 and result were presented in this paper.
International Journal of Academic Information Systems Research (IJAISR) ISSN: 2643-9026 Vol. 5 Issue 12, December - 2021, Pages:30-36 , 2021
In the overall health of women, hormones play significant roles. A fluctuation in hormone level l... more In the overall health of women, hormones play significant roles. A fluctuation in hormone level leads to imbalance which at the end may have a negative impact on the health of the individual affected. Most diagnostic errors occur as a result of uncertainty, missing information and miscommunication. The lack of certainty about an outcome of diagnosis may lead to wrong medication, and this may lead to death of a patient or an irreversible medical condition. Providing correct information and making accurate diagnosis at the right time has the potential to prevent these unfavorable circumstances. This research proposes a web-based interactive expert system for the diagnosis and prediction of hormone imbalance using Bayesian Networks. Based upon the accuracy measure, all the classifiers used in the modeling process performed well. The selected model used for hormone imbalance expert system (Bayesian Networks) has an accuracy value of 98.33% with 0.98 precision and 0.98 recall values. Furthermore, the expert system was evaluated through usability testing (efficiency, few errors, learnability, memorability and satisfaction). The overall experience value of 4.29 was obtained after the usability testing. The expert system in this study was designed in such a way that a user can make use of the application remotely by installing it on an android device. This research discovered that expert system could be a more efficient method in addressing hormone imbalance diagnosis. Also, adoption of experts system could help save time in the diagnostic procedure of patients.
International Journal of Computer Applications (0975 – 8887) Volume 167(1), pp 24-28 , 2017
In recent times, it has been discovered that fuzzy logic is an important tool for effective traff... more In recent times, it has been discovered that fuzzy logic is an important tool for effective traffic control system. Research on intelligent traffic systems has revealed that the implementation of linguistic variables in fuzzy systems help in taking care of diverse possible decisions that can be taken by humans in traffic control. However, the majority of these works focus on vehicular traffic without adequate consideration for pedestrian crossings. This research therefore focuses on incorporation of pedestrian crossing variables into vehicular traffic control using fuzzy logic. The implementation of the fuzzy logic inference system was carried out using MATLAB 2014a. The impact of pedestrian delay, total pedestrian were part of consideration for signal time allocation. The result proved that pedestrian delay has significant contribution to traffic control systems to enhance safety of pedestrians.
A safety Driven Review of Wearables and A proposed Safety Framework FUDMA Journal of Sciences Vol. 1 No. 1 pp 35 -39 ISSN 26161370 , 2018
As computers move from the desktop, to the palm top, and onto our bodies and into our everyday li... more As computers move from the desktop, to the palm top, and onto our bodies and into our everyday lives, infinite opportunities arise to realize various applications that have never before been possible. As wearable technologies such as the Google Glass, Earbuds are developed and released to the public, health problems resulting from volume of rays that are penetrating human bodies through the signal emissions from these devices must be acknowledged and accounted for. This paper presents wearable computer devices their uses, hazards and the need for the adoption of global safety standards in order to make them safe for users. It also proposed a framework for evaluating the safety use of the wearable devices.
Proceedings of First International conference on Education and Development. pp 95-101, 2018
Vehicle-Pedestrian interaction has the tendency of increasing the crash rate as the number of ped... more Vehicle-Pedestrian interaction has the tendency of increasing the crash rate as the number of pedestrians and vehicles increases on the roads. Models exist that predict the rate of road accident crashes using traffic counts without taking into considerations intersection designs implementations that can influence crash rate. Moreover, pedestrian crash database records are often sparsely available. A surrogate safety measure is therefore necessary to evaluate safety implications of different intersection designs and traffic control strategies as a means of proactive safety solution. In this research, three traffic control strategies were modelled for a crosswalk incorporated four-way intersection. The traffic network was implemented as unsignalized intersection, signalized fixed time traffic control and as Fuzzy Intelligent Traffic Control (FITC) using VerkehrInStadten-SIMulationsModell (VISSIM) traffic simulator. Trajectory files from the network were analyzed and the potential interaction between vehicles and pedestrians at these intersections were quantified using surrogate safety parameters. The results indicate the safety status of each traffic control strategy.
Global Journal of Computer Science and Technology Vol 16(2)pp1-7 https://computerresearch.org/index.php/computer/article/view/1422, 2016
The time when someone can do real, publishable mathematics completely without the aid of a comput... more The time when someone can do real, publishable mathematics completely without the aid of a computer is coming to a close; the use of computers in mathematical research is both widespread and under-acknowledged. Mathematicians use computers in a number of ways. This paper highlights the importance of mathematics and digital age in today's technological advancement; it also explains the influence of digital age on Mathematics research. Key areas where Information and Communication Technology can be applied to Mathematical research are discussed. To demonstrate the use of computer program on Mathematical analysis, some problems were solved analytically and were also solved using computer programs (Mathlab and Python). These two procedures are compared and it is clearly shown that using computer packages to solve Mathematical problems are more efficient, easier and accurate.
International Journal of Computer Applications, 2017
In recent times, it has been discovered that fuzzy logic is an important tool for effective traff... more In recent times, it has been discovered that fuzzy logic is an important tool for effective traffic control system. Research on intelligent traffic systems has revealed that the implementation of linguistic variables in fuzzy systems help in taking care of diverse possible decisions that can be taken by humans in traffic control. However, the majority of these works focus on vehicular traffic without adequate consideration for pedestrian crossings. This research therefore focuses on incorporation of pedestrian crossing variables into vehicular traffic control using fuzzy logic.
A wireless Ad-hoc network consists of wireless nodes communicating without the need for a central... more A wireless Ad-hoc network consists of wireless nodes communicating without the need for a centralized administration; all nodes potentially contribute to the routing process. The fragile and temporary nature of mobile ad-hoc connectivity makes quality of service a crucial issue. In this paper, mobile ad-hoc wireless network of 25 nodes were modelled using Riverbed Modeller for the purpose of evaluating quality of service performance of different queuing policies. The simulation results of four different scenarios of wireless ad hoc networks were reported. The quality of service of the different queuing policies were evaluated in terms of traffic received, network delay and throughput. In this simulation environment, priority queue and Weighted Fair Queuing (WFQ) scheduling performs better than First In First Out (FIFO) and custom queuing scheduling in terms of traffic received. On the other hand, Wireless Local Area Network (WLAN) delay in FIFO and Custom queuing scheduling is less ...
Over the years, devices and the use of networks has grown by leaps and bounds thereby making the ... more Over the years, devices and the use of networks has grown by leaps and bounds thereby making the Dynamic Host Configuration Protocol (DHCP) a very important network management tool. Initially, the protocol focused more on ease of use rather than security, which made it vulnerable to attacks like DHCP starvation among others. There are techniques which have been developed over the years to mitigate attacks to the DHCP server. This research used DHCP snooping to mitigate the attack to achieve a more secured network. The experiment was done in a virtual environment using GNS3. Due to the type of malicious packets that was generated during attack, the LAN was isolated from the Internet to avoid any destruction. The experiment demonstrated how easy it was to attack and exhaust DHCP pool of address thereby prohibited the legitimate client from getting IP address. The research also demonstrated the mitigation of DHCP starvation attack by using DHCP snooping.
A wireless Ad-hoc network consists of wireless nodes communicating without the need for a central... more A wireless Ad-hoc network consists of wireless nodes communicating without the need for a centralized administration; all nodes potentially contribute to the routing process. In this paper, the quality of service of ad-hoc wireless network was analyzed based on different queuing policy. The simulation results of four different scenarios of wireless ad hoc networks having twenty five nodes were reported. The quality of service of the proposed network are evaluated in terms of traffic received, network delay and throughput using OPNET simulator. Data rate of 2Mbps and simulation time of 15 minutes were taken. In this simulation environment, priority queue and weighted queue scheduling performs better than FIFO and custom queuing scheduling in terms of traffic received. On the other hand, WLAN delay in FIFO and custom queuing scheduling is less than that of Priority queuing scheduling.
Global journal of computer science and technology, 2016
The time when someone can do real, publishable mathematics completely without the aid of a comput... more The time when someone can do real, publishable mathematics completely without the aid of a computer is coming to a close; the use of computers in mathematical research is both widespread and under-acknowledged. Mathematicians use computers in a number of ways. This paper highlights the importance of mathematics and digital age in today’s technological advancement; it also explains the influence of digital age on Mathematics research. Key areas where Information and Communication Technology can be applied to Mathematical research are discussed. To demonstrate the use of computer program on Mathematical analysis, some problems were solved analytically and were also solved using computer programs (Mathlab and Python). These two procedures are compared and it is clearly shown that using computer packages to solve Mathematical problems are more efficient, easier and accurate.
As computers move from the desktop, to the palm top, and onto our bodies and into our everyday li... more As computers move from the desktop, to the palm top, and onto our bodies and into our everyday lives, infinite opportunities arise to realize various applications that have never before been possible. As wearable technologies such as the Google Glass, Earbuds are developed and released to the public, health problems resulting from volume of rays that are penetrating human bodies through the signal emissions from these devices must be acknowledged and accounted for. This paper presents wearable computer devices their uses, hazards and the need for the adoption of global safety standards in order to make them safe for users. It also proposed a framework for evaluating the safety use of the wearable devices.
International Journal of Research and Innovation in Applied Science, 2021
Transmission control protocol (TCP) provides a reliable data transfer in all end-to-end data stre... more Transmission control protocol (TCP) provides a reliable data transfer in all end-to-end data stream services on the internet. There are some mechanisms that TCP has that make it suitable for this purpose. Over the years, there have been modifications in TCP algorithms starting from the basic TCP that has only slow-start and congestion avoidance algorithm to the modifications and additions of new algorithms. Today, TCP comes in various variants which include TCP Tahoe, Reno, new reno, vegas, sack etc. Each of this TCP variant has its peculiarities, merits and demerits. This paper is a review of four TCP variants, they are: TCP tahoe, Reno, new reno and vegas, their congestion avoidance algorithms, and possible future research areas.
Routers (sometimes gateways) are important devices in internetworks. Routers play the task of int... more Routers (sometimes gateways) are important devices in internetworks. Routers play the task of interconnecting and partly securing network devices by forwarding packets from source address to destination address. Security on routers is achieved by determining whether packets to be forwarded are authorized to get to their desired destination. This action can be carried out by exploiting misconfigured ACL (Access Control List). ACL is a list of rules that determine whether and how to forward or discard a packet on a network i.e. it filters packets. ACL can also be used for implementing network policies such as NAT (Network address Translation). A correct ACL configured on a router examines each packet to determine whether to forward or drop the packet, this decision is based on the rules specified within the access lists leading to secure network and packet flow. In corporate organizations sometimes there is an interconnection between various LANs but not all devices are allowed to acc...
FUDMA Journal of Sciences (FJS) ISSN online: 2616-1370 ISSN print: 2645 – 2944 Vol. 3 No. 3, September, 2019, pp 264 –269, 2019
Routers (sometimes gateways) are important devices in internetworks. Routers play the task of int... more Routers (sometimes gateways) are important devices in internetworks. Routers play the task of interconnecting and partly securing network devices by forwarding packets from source address to destination address. Security on routers is achieved by determining whether packets to be forwarded are authorized to get to their desired destination. This action can be carried out by exploiting misconfigured ACL (Access Control List). ACL is a list of rules that determine whether and how to forward or discard a packet on a network i.e. it filters packets. ACL can also be used for implementing network policies such as NAT (Network address Translation). A correct ACL configured on a router examines each packet to determine whether to forward or drop the packet, this decision is based on the rules specified within the access lists leading to secure network and packet flow. In corporate organizations sometimes there is an interconnection between various LANs but not all devices are allowed to access a device on particular LAN because of the nature of the resources on that device, hence in such scenario ACL is a good choice when looking for the appropriate tool to control the device access. In this paper we have designed a model of a corporate network with 3 Local Area Networks (LANs), and packets traverse the devices on the LANs). After applying the correct ACL configurations on the LAN 2 Router access is restricted on LAN 2 server, which now only receives packets from an authorized device, this greatly enhances the security of the LAN.
International Journal of Engineering Research & Technology (IJERT) Vol. 3 Issue 8, pp 586-595; ISSN: 2278-0181 , 2014
The advent of mobile Information and Communication Technology (ICT) has recorded a steady growth ... more The advent of mobile Information and Communication Technology (ICT) has recorded a steady growth rate over the past decade but has however given way to something greater and a more alarming increase in the rate of internet insecurity and cybercrime in Nigeria. It is therefore no wonder that crimes like mail scams, phishing, identity theft and privacy intrusion among others are on the increase in the country. Although some efforts have been made in the past to reduce the incidence of these cybercrimes, it is quite obvious that the high demand on mobile ICT and their numerous benefits are been played upon to the detriment of innocent people. This paper discusses the current internet security situation and the direct impact of mobile information and communication technologies on cybercrime in Nigeria and as well proffer solutions.
Proceedings of 4th International Conference on Information Technology in Education and Development 2021, Abuja. Pp126-132, 2021
sIn a relatively small network (one or two switches), switches achieve communication (forwarding ... more sIn a relatively small network (one or two switches), switches achieve communication (forwarding of frames) between each other seamlessly. It is a common practice to interconnect switches for redundancy. When switches are interconnected, it is usually difficult for the network to completely fail even if one of the connected links fails. When switches are interconnected to achieve redundancy, a serious network problem or challenge is bound to happen which is, the time required to re-converge such a network when a link fails or when there is a major change in the network topology. This paper presents a mechanism at layer2 segment of a network to achieve sub-second convergence when a failure occurs. The approach will be the use of layer3 switches that support dynamic routing algorithms to achieve link-state-advertisement between participating switches. This way, individual switches will not have to rely on other switches to forward a frame since each switch has an updated database of the current network topology. The results of the simulation clearly shows that the use of routing protocol (OSPF) at layer2 contributed greatly towards achieving sub-second converge and avoiding layer2 loops
Proceedings of Information Technology in Education and Development, 2020
Despite the fact that many research works have been done on the way to securing documents on webs... more Despite the fact that many research works have been done on the way to securing documents on websites, attackers are day by day finding means of detecting a way to break all the security methods. One of the ways of these prevention is Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) which is used to protect websites such as E-mail providers, social networks, and online business from unauthorized user. This research work reviewed major text CAPTCHA in existence, and proposed an Enhanced CAPTCHA based authentication using Mathematical operation to provide solutions to most common problem of the existing ones such as inlegibility of character and easy penetration by smart robots. The proposed system based the authentication on random mathematics expression with alteration in the operator for the user to respond to the challenge by supplying the correct answer. The implementation was developed using Visual Basic 2010 and result were presented in this paper.
International Journal of Academic Information Systems Research (IJAISR) ISSN: 2643-9026 Vol. 5 Issue 12, December - 2021, Pages:30-36 , 2021
In the overall health of women, hormones play significant roles. A fluctuation in hormone level l... more In the overall health of women, hormones play significant roles. A fluctuation in hormone level leads to imbalance which at the end may have a negative impact on the health of the individual affected. Most diagnostic errors occur as a result of uncertainty, missing information and miscommunication. The lack of certainty about an outcome of diagnosis may lead to wrong medication, and this may lead to death of a patient or an irreversible medical condition. Providing correct information and making accurate diagnosis at the right time has the potential to prevent these unfavorable circumstances. This research proposes a web-based interactive expert system for the diagnosis and prediction of hormone imbalance using Bayesian Networks. Based upon the accuracy measure, all the classifiers used in the modeling process performed well. The selected model used for hormone imbalance expert system (Bayesian Networks) has an accuracy value of 98.33% with 0.98 precision and 0.98 recall values. Furthermore, the expert system was evaluated through usability testing (efficiency, few errors, learnability, memorability and satisfaction). The overall experience value of 4.29 was obtained after the usability testing. The expert system in this study was designed in such a way that a user can make use of the application remotely by installing it on an android device. This research discovered that expert system could be a more efficient method in addressing hormone imbalance diagnosis. Also, adoption of experts system could help save time in the diagnostic procedure of patients.
International Journal of Computer Applications (0975 – 8887) Volume 167(1), pp 24-28 , 2017
In recent times, it has been discovered that fuzzy logic is an important tool for effective traff... more In recent times, it has been discovered that fuzzy logic is an important tool for effective traffic control system. Research on intelligent traffic systems has revealed that the implementation of linguistic variables in fuzzy systems help in taking care of diverse possible decisions that can be taken by humans in traffic control. However, the majority of these works focus on vehicular traffic without adequate consideration for pedestrian crossings. This research therefore focuses on incorporation of pedestrian crossing variables into vehicular traffic control using fuzzy logic. The implementation of the fuzzy logic inference system was carried out using MATLAB 2014a. The impact of pedestrian delay, total pedestrian were part of consideration for signal time allocation. The result proved that pedestrian delay has significant contribution to traffic control systems to enhance safety of pedestrians.
A safety Driven Review of Wearables and A proposed Safety Framework FUDMA Journal of Sciences Vol. 1 No. 1 pp 35 -39 ISSN 26161370 , 2018
As computers move from the desktop, to the palm top, and onto our bodies and into our everyday li... more As computers move from the desktop, to the palm top, and onto our bodies and into our everyday lives, infinite opportunities arise to realize various applications that have never before been possible. As wearable technologies such as the Google Glass, Earbuds are developed and released to the public, health problems resulting from volume of rays that are penetrating human bodies through the signal emissions from these devices must be acknowledged and accounted for. This paper presents wearable computer devices their uses, hazards and the need for the adoption of global safety standards in order to make them safe for users. It also proposed a framework for evaluating the safety use of the wearable devices.
Proceedings of First International conference on Education and Development. pp 95-101, 2018
Vehicle-Pedestrian interaction has the tendency of increasing the crash rate as the number of ped... more Vehicle-Pedestrian interaction has the tendency of increasing the crash rate as the number of pedestrians and vehicles increases on the roads. Models exist that predict the rate of road accident crashes using traffic counts without taking into considerations intersection designs implementations that can influence crash rate. Moreover, pedestrian crash database records are often sparsely available. A surrogate safety measure is therefore necessary to evaluate safety implications of different intersection designs and traffic control strategies as a means of proactive safety solution. In this research, three traffic control strategies were modelled for a crosswalk incorporated four-way intersection. The traffic network was implemented as unsignalized intersection, signalized fixed time traffic control and as Fuzzy Intelligent Traffic Control (FITC) using VerkehrInStadten-SIMulationsModell (VISSIM) traffic simulator. Trajectory files from the network were analyzed and the potential interaction between vehicles and pedestrians at these intersections were quantified using surrogate safety parameters. The results indicate the safety status of each traffic control strategy.
Global Journal of Computer Science and Technology Vol 16(2)pp1-7 https://computerresearch.org/index.php/computer/article/view/1422, 2016
The time when someone can do real, publishable mathematics completely without the aid of a comput... more The time when someone can do real, publishable mathematics completely without the aid of a computer is coming to a close; the use of computers in mathematical research is both widespread and under-acknowledged. Mathematicians use computers in a number of ways. This paper highlights the importance of mathematics and digital age in today's technological advancement; it also explains the influence of digital age on Mathematics research. Key areas where Information and Communication Technology can be applied to Mathematical research are discussed. To demonstrate the use of computer program on Mathematical analysis, some problems were solved analytically and were also solved using computer programs (Mathlab and Python). These two procedures are compared and it is clearly shown that using computer packages to solve Mathematical problems are more efficient, easier and accurate.
Ahmadu Bello University Zaria, PhD Research, http://kubanni.abu.edu.ng/jspui/bitstream/123456789/10331/1/PhD%20Research\_olanrewaju%20-%202017.pdf , 2017
Walking as a mode of transportation has many benefits for pedestrians and the society. Yet, pedes... more Walking as a mode of transportation has many benefits for pedestrians and the society. Yet, pedestrians are a vulnerable group and safety concerns are a significant barrier to walking especially as vehicle volume increases. Although multiple countermeasures have been proposed to promote pedestrian safety, pedestrian crash rates across the globe indicate that more research is required on pedestrian safety as vehicular volume increases. Transportation Research so far covers congestion reduction, environmental pollution control and signal control system to make vehicular traffic more convenient without adequate consideration for pedestrian right of way. Intelligent transportation research mostly focuses on sensitive system that manages signal timing for vehicular signals. Most research towards pedestrian identify the need for safety by analyzing crash data without proffering adequate solution to vehicle-pedestrian crashes that result from prolonged pedestrian delay. Most transportation and town planners design roadways without sufficient consideration for pedestrians; hence there exist highways with multiple lanes without pedestrian facilities. It is therefore very necessary to have a traffic model that considers pedestrian characteristics as well as vehicle characteristics to harmonize the conflicting interest of waiting pedestrians and driver satisfaction to improve safety. This research work designed an architectural framework that comprises vehicular/pedestrian modules and a reasoner. An intelligent fuzzy logic model was developed to implement the reasoner that harmonizes both vehicle and pedestrian characteristics to dynamically control the signal timing. A four way intersection was modeled in VerkehrInStadten-SIMulationsmodell (VISSIM) traffic simulator to implement the road network. The traffic network was implemented as unsignalized, signalized fixed time traffic control and as Fuzzy Intelligent Traffic Control (FITC). From the evaluation of the system, the FITC achieved average improvement of 53.19% over fixed time traffic control, FITC Pedestrian delay improved by 13.13% over fixed time, hence a potential crash rate reduction from 2.83% to 0.37% using crash data obtained from Federal Road Safety Corps (FRSC) records. Calibration of traffic model volumes also gave acceptable Geoffrey E. Havers (GEH) of less than 5.0