Olaniyi Olayemi Mikail

Olaniyi Olayemi Mikail
Federal University of Technology Minna · Department of Computer Engineering

BTech,MSc,PhD

About

123
Publications
281,505
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
671
Citations
Introduction
Olaniyi, O. M(PhD) is a progressive academic professional demonstrating consistent success in research, professional impact, national and global recognition. He is professionally registered with COREN,IEEE, ACM, IRED,NCS,CSEAN. He has published a number of articles in reputable Journals and International Conferences. His research areas among others include: Computer/Information Security, Intelligent/ Embedded Systems and Medical informatics.
Additional affiliations
October 2018 - present
Federal University of Technology Minna
Position
  • Professor (Associate)
Description
  • Research, Teaching and Community Service
October 2015 - September 2018
Federal University of Technology Minna
Position
  • Professor (Associate)
August 2012 - September 2015
Federal University of Technology Minna
Position
  • Lecturer
Education
July 2011 - April 2015
Ladoke Akintola University of Technology
Field of study
  • Computer Science and Engineering(Computer Security)
November 2007 - May 2011
Lagos State University
Field of study
  • Electronic and Computer Engineering
January 2000 - December 2005
Ladoke Akintola University of Technology
Field of study
  • Computer Engineering

Publications

Publications (123)
Conference Paper
Full-text available
This paper proposes the development of a novel optimization algorithm called the Pastoralist Optimization Algorithm (POA) inspired by the pastoralists herding strategies. The strategies are scouting, camp selection, camping, herd splitting and merging. These strategies were modelled mathematically and used to develop the POA. The performance of the...
Chapter
This chapter presents a distributed e-voting system that solves the problems of vote-rigging, voter impersonation, and vote falsification, all of which are prevalent in traditional paper ballot systems. In general, the digitization of democratic decision-making is convenient, fast, and cost-saving but can become a gateway for electoral fraud if not...
Article
Full-text available
Blockchain technology has gained lots of traction in the past five years due to the innovations introduced in digital currency, the Bitcoin. This technology is powered by distributed ledger technology, which is a distributed database system. It is often renowned for decentralization, anti-attack, and unfalsified attributes making it a top choice in...
Article
Full-text available
Blockchain is a distributed and decentralized ledger of transactions that are linked together cryptographically leading to immutability and tamper-resistance, thereby ensuring the integrity of data. Due to the ability of blockchain to guarantee the integrity of data, it has found wide-range adoption in electronic voting (e-voting) systems in recent...
Article
Full-text available
The growth of Internet of Things (IoT) took center stage universally due their capability to advance the course of human lives. Consequent upon this, several challenges were thrown up such as security of huge data stored and transmitted through network communication channels. IoT insecurity is partly due to centralization architecture, low computat...
Article
Full-text available
The proliferation of the "Internet of Things" (IoT) and its applications have affected every aspect of human endeavors from smart manufacturing, agriculture, healthcare, and transportation to homes. The smart home is vulnerable to malicious attacks due to memory constraint which inhibits the usage of traditional antimalware and antivirus softwa...
Chapter
The importance of agriculture to the economic growth in sub-Saharan Africa suffers from several challenges. One of the major problems faced by the sector is the lack of suitable technology to optimize yield and profit to reduce the reliance of farmers on manual techniques of farming which is accompanied by drudgery, wastage, and low yields. Precisi...
Chapter
In this paper, the performance of the recently developed Pastoralist Optimization Algorithm (POA) on classical uncapacitated Facility Location problem (UFLP) was investigated. POA is a culture-inspired metaheuristic motivated by the herding schemes of Nomadic Pastoralist (NP). The NP seek optimal herding location for their livestock using some well...
Chapter
The adoption of mobile technologies in education are evolving like in the business and health sectors. The design of user-centric platform to enable individuals participate in the activities of learning and teaching is currently area of research. The Learning Management Systems (LMS) area assists learners and academic activities but, it continues t...
Chapter
The use of cryptosystem became popular because of the increased need for exchanges across untrusted medium especially Internet-enabled networks. On the basis of application several forms of cryptosystems have been developed for purpose of authentication, confidentiality, integrity, and non-repudiation. Cryptosystems make use of encryption schemes t...
Chapter
Precision farming helps to achieve maintainable agriculture, with an objective of boosting agricultural products with minimal negative impact on the environment. This paper outlines a deep learning approach based on Single Shot multibox Detector (SSD) to classify and locate weeds in low-land rice precision farming. This approach is designed for pos...
Chapter
Agriculture and agribusinesses suffer from many challenges, despite their significance to global economic growth. One of the challenges is the lack of appropriate technology to drive the industry to the next level of development. This technological gap contributes to reduced yield and profit without a reduction in manual labour, cost, and stress. R...
Article
Full-text available
Structural Health Monitoring (SHM) is a process of detecting damages to engineering structures. The goal of SHM is to improve both the safety and reliability of infrastructures such as buildings, bridges, and highways. Several efforts have been made to develop improved SHM systems. However, most of these studies only considered vibration as a monit...
Article
Full-text available
Distribution transformers are a vital component of electrical power transmission and distribution system. Frequent Monitoring transformers faults before it occurs can help prevent transformer faults which are expensive to repair and result in a loss of energy and services. The present method of the routine manual check of transformer parameters by...
Article
Full-text available
Nowadays, the demand for video surveillance systems is rapidly increasing as an essential component of many security formations and apparatuses. Many times, video surveillance has demonstrated its importance and benefits by providing immediate supervision of environment, people and their valuable properties. However, surveillance has been a major i...
Article
Full-text available
Crime control in human societies has continued to pose significant problems and requires dynamic approaches to be subdued through effective investigation mechanisms. Notable among these approaches is the use of biometric facial recognition which has proven to be ideal, due to its flexible and non-intrusive nature. Mainly, this research conducted a...
Article
Full-text available
span>Agricultural sector is one of the economic pillars of developing nations, because it provides means of boosting gross domestic profit. However, weeds pose a threat to food crop by competing with it for nutrients and undermining the profit to be made from it. The treatment of these weeds is necessary, but at minimal impact on the actual food cr...
Article
Full-text available
Distribution transformers are a vital component of electrical power transmission and distribution system. Frequent Monitoring transformers faults before it occurs can help prevent transformer faults which are expensive to repair and result in a loss of energy and services. The present method of the routine manual check of transformer parameters by...
Research
Full-text available
The advent of technology has led to the automation of a number of systems globally such that the use of machines, control systems and information technology are implemented to optimize productivity in the manufacturing of goods and delivery of services. A typical poultry farm requires a lot of labour, but automation can proficiently moderate the am...
Article
Full-text available
For a number of health conditions, the number of Internet of Things (IoT) devices available for self and remote monitoring are growing rapidly, and users are also increasing. In the same vein, cyber criminals are putting lots of effort into making these devices unsafe for users, and this has generated growing privacy concerns for both users and man...
Conference Paper
Full-text available
The successful storage, manipulation and retrieval of electronic medical records are some of the important functions of Electronic-Health Record (EHR) Systems. More so, the confidentiality and integrity of health information is of paramount importance to healthcare management organizations. Unfortunately, the occurrence of information security brea...
Conference Paper
Full-text available
Every ethnic, religious, and gender communities have electorates living with disability. They represent approximately 0.15 percent of the world's population roughly one out of every seven. When appropriate mechanism is not in place for such large volume of populace to fully participate in the electoral process, it deters democracy from giving this...
Article
Full-text available
The application of precision agriculture in farming practices results in higher yield and productivity with lower costs. Several works have applied this concept to poultry farming in an attempt to reduce human involvement, stress, fatigue, wastage of poultry feed as well as provided a high return on investment. A number of these systems lack contro...
Article
Full-text available
Democratic government in the world today rely on electronic voting as the foremost means of providing credible, transparent and fair elections for the electorate. There is a need for developed electronic voting systems to be security enhanced to ensure the authenticity of the developed system. Traditional paper balloting systems suffer from vote ta...
Article
Full-text available
The aim of this paper is to design a secure electronic voting system that is based upon the electoral process for developing countries. The concept of voters’ information processing and storage arose immediate fears about election data security and privacy. If the voter’s choice is accessed by an illegitimate party, it may lead to malicious attack...
Article
Full-text available
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer's data confidentiality and integrity but also breach in the verification of user's authentication. Several challenges are associated w...
Article
Full-text available
Structural Health Monitoring (SHM) is a process of detecting damages in Engineering structures in order to reduce the frequency of collapse of buildings. In this work, an expert system was incorporated to SHM for monitoring residential buildings. The developed system used a Wireless Sensor Network (WSN) based on 2.4GHz Radio Frequency (RF) band. Th...
Article
Full-text available
Democracy involves a system of governance where citizens are at liberty to actively participate in the nation's decision-making process by means of election. However, elections in most developing countries characteristically involve rigging in form of ballot snatching, falsification of votes and votes' manipulation during and after electoral proces...
Conference Paper
Full-text available
The proliferation of Internet of Things (IoT) and its applications have affected every aspect of human endeavours; from smart manufacturing, agriculture, healthcare, logistics, Government, cities, transportation to Homes. The ubiquitous nature of IoT makes the security of information on transit and at rest a great concern, especially to smart home...
Conference Paper
Full-text available
System availability is a criterion that e-voting systems are required to satisfy. This involves ensuring that an e-voting system is secure whenever a Distributed Denial-of-Service attack occurs and that voters could always have access to the system during election. System availability can be a serious security challenge faced by e-voting system, si...
Conference Paper
Full-text available
The proliferation of Internet of Things (IoT) and its applications have affected every aspect of human endeavours; from smart manufacturing, agriculture, healthcare, logistics, Government, cities, transportation to Homes. The ubiquitous nature of IoT makes the security of information on transit and at rest a great concern, especially to smart home...
Conference Paper
Full-text available
This paper reviews scholarly articles on the application of blockchain technology for secure electronic voting (e-voting). Furthermore, the feasibility of using blockchain technology to replace the existing manual or semi-digitized voting system in developing countries with Nigeria as a case study is performed. To analyse the current state and prep...
Article
Full-text available
The increasing trends in intelligent control systems design has provide means for engineers to evolve robust and flexible means of adapting them to diverse applications. This tendency would reduce the challenges and complexity in bringing about the appropriate controllers to effect stability and efficient operations of industrial systems. This pape...
Article
Full-text available
Human vital physiological parameters (HVPP) monitoring with embedded sensors integration has improved the smart system technology in this era of a ubiquitous platform. Several IoT-based healthcare applications have been proposed for remote health monitoring. Most of the devices developed require one on one contact with doctors before any medical di...
Article
Full-text available
Electronic cards like magnetic cards and smart cards have been used worldwide for different functions such as electronic payment system (credit card and debit/ATM cards), electronic voting system, personnel identification system and security system. In this paper, we present an electronic card-based solution to the lecture attendance problem in hig...
Article
Full-text available
The recent advancement in smart technology design with integration of smart sensors and embedded components has rapidly improved human lives in so many areas which includes home automation, smart phones, smart healthcare, smart cars and so on. Therefore, smart home security demand serious attention and is indispensable in this era of internet of th...
Article
Full-text available
This paper presents a wearable pressure bandage system (ScorpioBand) to discourage unsafe first aid practices by scorpion sting victims. A pressure bandage is utilized to apply pressure over the entire surface around the sting point to reduce the likelihood of scorpion envenomation and pressure transducers were used to acquire bandage pressure sign...
Article
Full-text available
Asphalt paved roads in good condition are important infrastructure that contributes to a large extent the development of a nation. The technical cost and time required to manually assess asphalt paved road conditions have limited proper and timely planning in most developing countries. This paper presents an automated pothole detection system using...
Conference Paper
Full-text available
A door access control system using fingerprint a buzzer alarm is proposed to solve confidentiality and security issue is presented in this paper. Several secured access control methods and protocols have been proposed all over the globe; nevertheless all of them have their own deficits. The keys and padlock would have solved the issues of access co...
Article
This paper reviews scholarly articles on the application of blockchain technology for secure electronic voting (e-voting). Furthermore, the feasibility of using blockchain technology to replace the existing manual or semi-digitized voting system in developing countries with Nigeria as a case study is performed. To analyse the current state and prep...