Emmanuel AdetibaCovenant University · Department of Electrical and Information Engineering
Emmanuel Adetiba
R.Engr.(COREN), Ph.D
Visiting Prof. at KZN eSkills CoLab and Research Associate at the Institute for Systems Science, DUT, Durban, South Afr
About
149
Publications
147,527
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,131
Citations
Introduction
Emmanuel Adetiba is a Professor at the Department of Electrical and Information Engineering, Covenant University Ota, Ogun State, Nigeria. He is an Honorary Research Associate (HRA) at the Institute for Systems Science (ISS), Durban University of Technology, Durban, South Africa. His research focus areas are:
i) Machine Intelligence
ii) Software Defined Radio
iii) Cognitive Radio
iv) Biomedical Signal Processing.
v) Cloud Federation
Additional affiliations
Education
August 2007 - November 2013
September 2005 - July 2007
May 1997 - May 2002
Publications
Publications (149)
TITLE: E-PAYCHEQUE FRAMEWORK WITH CONTACT ELECTRONIC CARD AND FINGERPRINT BIOMETRIC FOR CASHLESS SMART CAMPUSES
ABSTRACT
Identity theft in financial transactions is a very rampant problem among students in most institutions of learning. Currently, in order to minimize financial theft, most schools dole out paper based “paycheques” to students, whi...
Artificial Neural Network is widely used to learn data from systems for different types of applications. The capability of different types of Integrated Circuit (IC) based ANN structures also depends on the hardware backbone used for their implementation. In this work, Field Programmable Gate Array (FPGA) based Multilayer Perceptron Artificial Neur...
This paper presents the description, measurements, and analysis of an investigation into the path loss channel characteristics of a complex building environment using the College of Engineering building of Afe Babalola University, Ado-Ekiti, Nigeria as a case study. The study is conducted on the first floor of the building, which is compartmentaliz...
The World Health Organization (WHO) posited that tuberculosis (TB) is among the world’s ten greatest causes of mortality. Early case identification and timely treatment could minimize TB morbidity and death rates. This study adopts the UNets model for automatically detecting TB in subjects by using a deep neural network to assess the size of indura...
This study delves into the utilization of Machine Learning (ML) techniques for predicting health
insurance cross-selling behavior in South African consumers. The main goal is to create a robust ML
model that assists health insurance companies in pinpointing potential customers with higher
probabilities of purchasing additional health insurance prod...
A drastic decline in the number of students that are enrolled for Engineering is now being experienced in developed as well as developing countries. Learning is becoming boring as a generation brought up on technology is losing the ability to pay attention in traditional classes for a long stretch of time. This has led to the idea that other teachi...
Television White Space (TVWS) emerges as an encouraging solution to address the challenge of a restricted wireless communication spectrum. It denotes the frequency range spanning from 54-790 MHz and researchers have increasingly explored its propagation characteristics in recent years. Nonetheless, a notable hindrance to its effective utilization l...
To efficiently use the finite wireless communication resource (radio spectrum), a Radio Environment Map (REM) is needed to monitor, analyse and provide rich awareness of spectrum activities in a radio propagating environment. REM shows radio coverage metrics in a geographical region. A REM construction model with few constraints and optimal perform...
Cervical dilation is the most important parameter that is assessed during childbirth to validate that a woman is truly in labour and whether labour is progressing as expected. It is the opening of a mother’s cervix from when it is closed at 0 cm to when it is fully dilated at 10 cm, for the baby to pass through and be delivered. The cervix is a cyl...
Lung Cancer (LC), have the highest mortality rate and the second-highest incidence rate of all cancers combined because of a pathophysiological imbalance in the fundamental mechanism of cell proliferation. For patients with LC, prompt diagnosis and treatment are of utmost importance. The orthodox methods employed for detecting LC are characterised...
Interference is one of the significant issues in television white space (TVWS) that limits the scalability of secondary user networks, lowers the quality of service, and causes harmful destruction to primary users. Interference among secondary users is one of the severe problems in TVWS because there is no legal rule that governs the coexistence of...
Polygenic Risk Score (PRS) analysis is a method that predicts the genetic risk of an individual towards targeted traits. Even when there are no significant markers, it gives evidence of a genetic effect beyond the results of Genome-Wide Association Studies (GWAS). Moreover, it selects single nucleotide polymorphisms (SNPs) that contribute to the di...
Various strains of Coronavirus have led to numerous deaths worldwide with CoViD-19 being the most recent. Hence, the need for various research studies to determine and develop technologies that would reduce the spread of this virus as well as aid in the early diagnosis of the disease. The Severe Acute Respiratory Syndrome CoV (SARS-CoV), which emer...
The fusion of two or more traits in multimodal biometrics generally improves recognition accuracy. The question is, by how much? Large-scale databases are better suited for training deep learning models for better generalization and accuracy. Therefore, a large-scale multimodal database is beneficial. However, publicly available large-scale multimo...
Cloud computing is a technology for efficiently using computing infrastructures and a business model for selling computing resources and services. However, intruders find such complex and distributed infrastructures appealing targets for cyber-attacks. Cyber-attacks are severe threats that can jeopardize the quality of service provided to clients a...
In the vehicle industry, connectivity and autonomy are becoming increasingly important features. One of the most used protocols for in-vehicle communication is the Controller Area Network (CAN) bus which manages the communication between networked components. However, the CAN bus, despite its critical importance, lacks sufficient security features...
Resource management in cloud infrastructure is one of the key elements of quality of services provided by the cloud service providers. Resource management has its taxonomy, which includes discovery of resources, selection of resources, allocation of resources, pricing of resources, disaster management, and monitoring of resources. Specifically, mon...
Customers are said to be the most important aspect of every business, as a business cannot function without the customers. Customer retention is one of the key drivers of business growth and is said to be as important as customer acquisition. This study aims at providing a predictive analysis on customer churn in the telecommunication industry usin...
With the development of cloud computing, load balancing issues have substantially become prominent, which is of concern as well to the industry as to academia. Load balancing contributes to a high degree of customer satisfaction and the use of resources in the cloud by verifying an accurate, secure, and equitable allocation of all computing resourc...
The recent deployment of automatic modulation recognition (AMR) for cognitive radio (CR) systems has significantly enhanced spectrum sensing capabilities. The utilization of real-time over-the-air digital radio frequency (RF) data for the development of a digital spectrum sensing model based on the automatic modulation classification (AMC) is prese...
Information systems in organizations traditionally require users to remember their secret pins (password), token, card number, or both to confirm their identities. However, the technological trend has been moving towards personal identification based on individual behavioural attributes (such as gaits, signature, and voice) or physiological (such a...
Active Speaker Detection (ASD) refers to the process of predicting who amongst a number of speakers whose faces appear on screen is speaking (if any) at any given time within the duration of a video. This paper proposes a novel method for determining active speakers in videos based on the standard deviations of Color Histograms (CHs) of the mouth r...
Cloud users have recently expanded dramatically. The cloud service providers (CSPs) have also increased and have therefore made their infrastructure more complex. The complex infrastructure needs to be distributed appropriately to various users. Also, the advances in cloud computing have led to the development of interconnected cloud computing envi...
Identification of signal waveforms is highly critical in 5G communications and other state-of-the-art radio technologies such as cognitive radios. For instance, to achieve efficient demodulation and spectrum sensing, cognitive radios need to implement automatic modulation recognition (AMR) of detected signals. Although many works have been reported...
The declaration of free education for the poor and working class by the South African government remains a key result of the two-year #FeesMustFall movement. The campaign was tainted by a few heinous incidents that sought to disrupt its objectives. This study examines the connections between online activism and real-world occurrences by undertaking...
Bots (social robots) are computer programs that replicate human behavior in online social networks. They are either fully automated or semi-automated, and their use makes online activism vulnerable to manipulation. This study examines the existence of social robots in the #FeesMustFall movement by conducting a scientific investigation into whether...
Polygenic Risk Score (PRS) analysis is a method that predicts the genetic risk of an individual towards targeted traits. Even when there are no significant markers, it gives evidence of a genetic effect beyond the results of Genome-Wide Association Studies (GWAS). Moreover, it selects single nucleotide polymorphisms (SNPs) that contribute to the di...
The cloud computing space is enjoying a renaissance. Not long ago, cloud computing was confined to the wall of high-revenue companies, but in recent times a growing number of businesses, public and private institutions are turning to the cloud computing platform to reap the benefits of a self-service, scalable, and flexible infrastructure. Moreover...
The spread of Coronavirus Disease-2019 worldwide necessitates the development of accurate identification methods and the determination of genetic relatedness. The result of genomic methods involving nucleotide alignment informed the considerations of several alignment-free techniques for virus detection. This paper presents a genomic sequence ident...
The fifth generation (5G) wireless network systems is also known as worldwide wireless web (W4) because based on laid-out expectations, it does not require limitations. Though 5G is not fully deployed at present, one major technology that will contribute immensely to its reality is massive MIMO. There are, however challenges associated with it whic...
Automatic Modulation Recognition (AMR) has been applied in several areas in wireless communication. However, out of all the developed AMR models, none has successfully catered for large number of blind detection of digital modulation schemes. In this current study, we simulated and labeled datasets for fifteen digital modulation schemes. The Signal...
In the vehicle industry, connectivity and autonomy are becoming increasingly important features. One of the most used protocols for in-vehicle communication is the Controller Area Network (CAN) bus which manages the communication between networked components. However, the CAN bus, despite its critical importance, lacks sufficient security features...
Background: In this work, a COVID19 Application Programming Interface (API) was built using the Representational State Transfer (REST) API architecture and it is designed to fetch data daily from the Nigerian Center for Disease Control (NCDC) website.
Methods: The API is developed using ASP.NET Core Web API framework using C# programming language a...
Lung Cancer (LC) is formed by an uncontrolled growth of abnormal cells in the lungs, which alters the body's metabolism. Early detection of LC is very important for a better survival rate and prognosis in patients and persons at risk of the disease. Traditional approaches to LC detection are less sensitive to cancerous cells at the early stage, are...
The teaching and learning activities at Osun State University, like those at every other institution of higher learning, are powered by electricity to a very large extent. Several coping strategies have been developed to achieve positive outcomes despite the epileptic and unpredictable nature of the electrical power supply to the campuses, which is...
This paper investigates the effect of number and shape of membership function (MF), and training data size on the performance of ANFIS model for predicting path losses in the VHF and UHF bands in built-up environments. Path loss propagation measurements were conducted in four cities of Nigeria over the cellular and broadcasting frequencies. A total...
Flooding, spoofing, replay, and fuzzing are common in various types of attacks faced by enterprises and various network systems. In-vehicle network systems are not immune to attacks and threats. Intrusion detection systems using different algorithms are proposed to enhance the security of the in-vehicle network. We use a dataset provided and collec...
Cloud computing is a technology that allows dynamic and flexible computing capability and storage through on-demand delivery and pay-as-you-go services over the Internet. This technology has brought significant advances in the Information Technology (IT) domain. In the last few years, the evolution of cloud computing has led to the development of n...
For decades now, a lot of radio wave path loss propagation models have been developed for predictions across different environmental terrains. Amongst these models, empirical models are practically the most popular due to their ease of application. However, their prediction accuracies are not as high as required. Therefore, extensive path loss meas...
Mobility has been identified to be a major characteristic of living things. Humans who are deprived of efficient mobility either by natural or man-made factors loose significant relationship with their environment. The growing demand to produce effective rehabilitation devices for the aged population and disabled individuals, have spurred us to dev...