
Olaniyi Olayemi MikailFederal University of Technology Minna · Department of Computer Engineering
Olaniyi Olayemi Mikail
BTech,MSc,PhD
About
123
Publications
281,505
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
671
Citations
Introduction
Olaniyi, O. M(PhD) is a progressive academic professional demonstrating consistent success in research, professional impact, national and global recognition. He is professionally registered with COREN,IEEE, ACM, IRED,NCS,CSEAN. He has published a number of articles in reputable Journals and International Conferences. His research areas among others include: Computer/Information Security, Intelligent/ Embedded Systems and Medical informatics.
Additional affiliations
Publications
Publications (123)
This paper proposes the development of a novel optimization algorithm called the Pastoralist Optimization Algorithm (POA) inspired by the pastoralists herding strategies. The strategies are scouting, camp selection, camping, herd splitting and merging. These strategies were modelled mathematically and used to develop the POA. The performance of the...
This chapter presents a distributed e-voting system that solves the problems of vote-rigging, voter impersonation, and vote falsification, all of which are prevalent in traditional paper ballot systems. In general, the digitization of democratic decision-making is convenient, fast, and cost-saving but can become a gateway for electoral fraud if not...
Blockchain technology has gained lots of traction in the past five years due to the innovations introduced in digital currency, the Bitcoin. This technology is powered by distributed ledger technology, which is a distributed database system. It is often renowned for decentralization, anti-attack, and unfalsified attributes making it a top choice in...
Blockchain is a distributed and decentralized ledger of transactions that are linked together cryptographically leading to immutability and tamper-resistance, thereby ensuring the integrity of data. Due to the ability of blockchain to guarantee the integrity of data, it has found wide-range adoption in electronic voting (e-voting) systems in recent...
The growth of Internet of Things (IoT) took center stage universally due their capability to advance the course of human lives. Consequent upon this, several challenges were thrown up such as security of huge data stored and transmitted through network communication channels. IoT insecurity is partly due to centralization architecture, low computat...
The proliferation of the "Internet of Things" (IoT) and its applications have
affected every aspect of human endeavors from smart manufacturing, agriculture,
healthcare, and transportation to homes. The smart home is vulnerable to malicious
attacks due to memory constraint which inhibits the usage of traditional antimalware and
antivirus softwa...
The importance of agriculture to the economic growth in sub-Saharan Africa suffers from several challenges. One of the major problems faced by the sector is the lack of suitable technology to optimize yield and profit to reduce the reliance of farmers on manual techniques of farming which is accompanied by drudgery, wastage, and low yields. Precisi...
In this paper, the performance of the recently developed Pastoralist Optimization Algorithm (POA) on classical uncapacitated Facility Location problem (UFLP) was investigated. POA is a culture-inspired metaheuristic motivated by the herding schemes of Nomadic Pastoralist (NP). The NP seek optimal herding location for their livestock using some well...
The adoption of mobile technologies in education are evolving like in the business and health sectors. The design of user-centric platform to enable individuals participate in the activities of learning and teaching is currently area of research. The Learning Management Systems (LMS) area assists learners and academic activities but, it continues t...
The use of cryptosystem became popular because of the increased need for exchanges across untrusted medium especially Internet-enabled networks. On the basis of application several forms of cryptosystems have been developed for purpose of authentication, confidentiality, integrity, and non-repudiation. Cryptosystems make use of encryption schemes t...
Precision farming helps to achieve maintainable agriculture, with an objective of boosting agricultural products with minimal negative impact on the environment. This paper outlines a deep learning approach based on Single Shot multibox Detector (SSD) to classify and locate weeds in low-land rice precision farming. This approach is designed for pos...
Agriculture and agribusinesses suffer from many challenges, despite their significance to global economic growth. One of the challenges is the lack of appropriate technology to drive the industry to the next level of development. This technological gap contributes to reduced yield and profit without a reduction in manual labour, cost, and stress. R...
Structural Health Monitoring (SHM) is a process of detecting damages to engineering structures. The goal of SHM is to improve both the safety and reliability of infrastructures such as buildings, bridges, and highways. Several efforts have been made to develop improved SHM systems. However, most of these studies only considered vibration as a monit...
Distribution transformers are a vital component of electrical power transmission and distribution system. Frequent Monitoring transformers faults before it occurs can help prevent transformer faults which are expensive to repair and result in a loss of energy and services. The present method of the routine manual check of transformer parameters by...
Nowadays, the demand for video surveillance systems is rapidly increasing as an essential component of many security formations and apparatuses. Many times, video surveillance has demonstrated its importance and benefits by providing immediate supervision of environment, people and their valuable properties. However, surveillance has been a major i...
Crime control in human societies has continued to pose significant problems and requires dynamic approaches to be subdued through effective investigation mechanisms. Notable among these approaches is the use of biometric facial recognition which has proven to be ideal, due to its flexible and non-intrusive nature. Mainly, this research conducted a...
span>Agricultural sector is one of the economic pillars of developing nations, because it provides means of boosting gross domestic profit. However, weeds pose a threat to food crop by competing with it for nutrients and undermining the profit to be made from it. The treatment of these weeds is necessary, but at minimal impact on the actual food cr...
Distribution transformers are a vital component of electrical power transmission and distribution system. Frequent Monitoring transformers faults before it occurs can help prevent transformer faults which are expensive to repair and result in a loss of energy and services. The present method of the routine manual check of transformer parameters by...
The advent of technology has led to the automation of a number of systems globally such that the use of machines, control systems and information technology are implemented to optimize productivity in the manufacturing of goods and delivery of services. A typical poultry farm requires a lot of labour, but automation can proficiently moderate the am...
For a number of health conditions, the number of Internet of Things (IoT) devices available for self and remote monitoring are growing rapidly, and users are also increasing. In the same vein, cyber criminals are putting lots of effort into making these devices unsafe for users, and this has generated growing privacy concerns for both users and man...
The successful storage, manipulation and retrieval of electronic medical records are some of the important functions of Electronic-Health Record (EHR) Systems. More so, the confidentiality and integrity of health information is of paramount importance to healthcare management organizations. Unfortunately, the occurrence of information security brea...
Every ethnic, religious, and gender communities have electorates living with disability. They represent approximately 0.15 percent of the world's population roughly one out of every seven. When appropriate mechanism is not in place for such large volume of populace to fully participate in the electoral process, it deters democracy from giving this...
The application of precision agriculture in farming practices results in higher yield and productivity with lower costs. Several works have applied this concept to poultry farming in an attempt to reduce human involvement, stress, fatigue, wastage of poultry feed as well as provided a high return on investment. A number of these systems lack contro...
Democratic government in the world today rely on electronic voting as the foremost means of providing credible, transparent and fair elections for the electorate. There is a need for developed electronic voting systems to be security enhanced to ensure the authenticity of the developed system. Traditional paper balloting systems suffer from vote ta...
The aim of this paper is to design a secure electronic voting system that is based upon the electoral process for developing countries. The concept of voters’ information processing and storage arose immediate fears about election data security and privacy. If the voter’s choice is accessed by an illegitimate party, it may lead to malicious attack...
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer's data confidentiality and integrity but also breach in the verification of user's authentication. Several challenges are associated w...
Structural Health Monitoring (SHM) is a process of detecting damages in Engineering structures in order to reduce the frequency of collapse of buildings. In this work, an expert system was incorporated to SHM for monitoring residential buildings. The developed system used a Wireless Sensor Network (WSN) based on 2.4GHz Radio Frequency (RF) band. Th...
Democracy involves a system of governance where citizens are at liberty to actively participate in the nation's decision-making process by means of election. However, elections in most developing countries characteristically involve rigging in form of ballot snatching, falsification of votes and votes' manipulation during and after electoral proces...
The proliferation of Internet of Things (IoT) and its applications have affected every aspect of human endeavours; from smart manufacturing, agriculture, healthcare, logistics, Government, cities, transportation to Homes. The ubiquitous nature of IoT makes the security of information on transit and at rest a great concern, especially to smart home...
System availability is a criterion that e-voting systems are required to satisfy. This involves ensuring that an e-voting system is secure whenever a Distributed Denial-of-Service attack occurs and that voters could always have access to the system during election. System availability can be a serious security challenge faced by e-voting system, si...
The proliferation of Internet of Things (IoT) and its applications have affected every aspect of human endeavours; from smart manufacturing, agriculture, healthcare, logistics, Government, cities, transportation to Homes. The ubiquitous nature of IoT makes the security of information on transit and at rest a great concern, especially to smart home...
This paper reviews scholarly articles on the application of blockchain technology for secure electronic voting (e-voting). Furthermore, the feasibility of using blockchain technology to replace the existing manual or semi-digitized voting system in developing countries with Nigeria as a case study is performed. To analyse the current state and prep...
The increasing trends in intelligent control systems design has provide means for engineers to evolve robust and flexible means of adapting them to diverse applications. This tendency would reduce the challenges and complexity in bringing about the appropriate controllers to effect stability and efficient operations of industrial systems. This pape...
Human vital physiological parameters (HVPP) monitoring with embedded sensors integration has improved the smart system technology in this era of a ubiquitous platform. Several IoT-based healthcare applications have been proposed for remote health monitoring. Most of the devices developed require one on one contact with doctors before any medical di...
Electronic cards like magnetic cards and smart cards have been used worldwide for different functions such as electronic payment system (credit card and debit/ATM cards), electronic voting system, personnel identification system and security system. In this paper, we present an electronic card-based solution to the lecture attendance problem in hig...
The recent advancement in smart technology design with integration of smart sensors and embedded
components has rapidly improved human lives in so many areas which includes home automation, smart phones, smart
healthcare, smart cars and so on. Therefore, smart home security demand serious attention and is indispensable in this
era of internet of th...
This paper presents a wearable pressure bandage system (ScorpioBand) to discourage unsafe first aid practices by scorpion sting victims. A pressure bandage is utilized to apply pressure over the entire surface around the sting point to reduce the likelihood of scorpion envenomation and pressure transducers were used to acquire bandage pressure sign...
Asphalt paved roads in good condition are important infrastructure that contributes to a large extent the development of a nation. The technical cost and time required to manually assess asphalt paved road conditions have limited proper and timely planning in most developing countries. This paper presents an automated pothole detection system using...
A door access control system using fingerprint a buzzer alarm is proposed to solve confidentiality and security issue is presented in this paper. Several secured access control methods and protocols have been proposed all over the globe; nevertheless all of them have their own deficits. The keys and padlock would have solved the issues of access co...
This paper reviews scholarly articles on the application of blockchain technology for secure electronic voting (e-voting). Furthermore, the feasibility of using blockchain technology to replace the existing manual or semi-digitized voting system in developing countries with Nigeria as a case study is performed. To analyse the current state and prep...