Oyediran Mayowa

Oyediran Mayowa
Ajayi Crowther University · Computer Science

B.Tech. M.Tech. PhD Computer Engineering

About

24
Publications
11,307
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
41
Citations
Citations since 2017
20 Research Items
41 Citations
201720182019202020212022202302468
201720182019202020212022202302468
201720182019202020212022202302468
201720182019202020212022202302468
Introduction
Skills and Expertise

Publications

Publications (24)
Article
Full-text available
Because of the flaws of the present university attendance system, which has always been time intensive, not accurate, and a hard process to follow. It, therefore, becomes imperative to eradicate or minimize the deficiencies identified in the archaic method. The identification of human face systems has evolved into a significant element in autonomou...
Chapter
Recognizing and reacting to the emotions of others is a key necessity for successful human engagement since emotions are such an important and vital component of being human. Speaking is the most intuitive method by which individuals ex-press themselves. It follows that this communication medium should be extended to computer programs. Affective co...
Conference Paper
Full-text available
The improvement of this paper takes advantage of the existing formal method called Stream XMachine by optimizing the theory and applying it to practice in a large-scale system. This optimized formal approach called Communicating Stream X-Machine (CSXM) applied in software testing based on its formal specifications to a distributed system as it poin...
Article
Full-text available
Cloud computing is a collection of disparate resources or services, a web of massive infrastructures, which is aimed at achieving maximum utilization with higher availability at a minimized cost. One of the most attractive applications for cloud computing is the concept of distributed information processing. Security, privacy, energy saving, reliab...
Article
Full-text available
Cloud platforms play an important role in future computing networks and should deliver their expected functionality at all epochs. They are modular and use multivendor subsystems that should be fully interoperable. However, the realization of multivendor component interoperability and functionality may not exist when upgraded components do not func...
Article
Full-text available
In the world today, individuals consistently fake their certificate to get a job or to present where and when required. The best way to single out those fake certificates is through verification. Notwithstanding, the paper verification sets aside a long process to handle certificate verification on the grounds that the certificates need to return t...
Article
Full-text available
Revenue generation has a positive and significant effect on the growth of any business. The existing work process in Nigerian Airspace Management Agency (NAMA) billing system creates the loophole for revenue deficit. The need to enhance the billing system of this organization prompted the need for this study. Primary data were collected from NAMA s...
Article
Full-text available
The increasing demand for airline services amidst limited resources results in passenger dissatisfaction and dwindling revenue for airports and airlines. The dynamics of service demand and resource supply results in check-in issues for the stakeholders in the commercial aviation industry. This has the effect of impacting negatively on service perfo...
Article
Full-text available
The door is an essential part of any structure that provides access and security of lives and properties. The manual operation of a door could be cumbersome and laborious when the traffic volume is high. Also, it has been observed that doors could serve as a medium of spreading the deadly coronavirus disease 2019 (COVID-19) infection. Therefore, a...
Article
Election voting has emerged as a significant alternative to conventional voting methods with testimonials of its implementation showing various degrees of success in some countries of the western world. Lately, many developing countries are also looking at its prospects as a replacement or supplement for traditional paper balloting which is, the pr...
Article
This paper details an empirical investigation of the factors that determine the intention of adopting and using electronic health records (EHR). The paper's goal is a study aimed at examining the possibilities and intents towards EHR amongst healthcare professionals in Nigeria. In this study, an extended Technology Acceptance Model (TAM) that incor...
Article
Full-text available
Mobile Ad-Hoc Network (MANET) is a network of mobile nodes that can communicate together without a fixed or centralized infrastructure. It is easily deployed and suitable for a broad range of applications in the various domains which include disaster management, fire outbreak, emergency operations and as well provide communication in places without...
Article
Full-text available
Textile designing involves producing patterns for cloth used in clothing, household textiles (such as towels) and decorative textiles such as carpets. In the past, numerous printing techniques have been employed in patterning textiles and they give an accurate representation of designs when utilized but designs produced by the conventional method a...
Conference Paper
Full-text available
The aim of this study is to analyze the different methods in which cyber criminals perpetrate their fraudulent acts on vulnerable individuals of developed nations. The set objectives of the study are to identify different strategies used to defraud vulnerable victims of developed nations, collect data from cyber criminals and victims via Google for...
Article
Full-text available
The level of technological advancement which engendered enhanced transportation of Liquefied Petroleum Gas (LPG) has, to a large extent, solved the problem of energy demand. Unfortunately, in doing this, it brought about concomitant risk-damage to the pipes as a result of human errors, natural disasters, and acts of vandalism. This paper addresses...
Conference Paper
Full-text available
In Mobile Ad-Hoc Network, unpredictable topology is one of the challenges that can degrade routing performance. Particle Swarm Optimization (PSO) is a routing technique that converges prematurely when large numbers of intermediate nodes are on the network. The work aim at developing an improved PSO algorithm, to reduce the rate of premature converg...
Article
Full-text available
Security is crucial all around. Access into institutions, examination centers, organizations or even estates ought to be controlled and closely monitored through a verification system. The method of authenticating a student for an examination has an obvious problem such as presentation of fake clearance card, impersonation and so on and the unethic...
Article
Full-text available
ABSTRACT: Mobile Network Operators (MNOs) permit subscribers to gain access to data, voice calls or short messaging services offered by their networks. Payments for any of these services could be via online payments platforms, short codes provided by financial institutions or the acquisition of recharge vouchers. Of these payment methods, the recha...
Conference Paper
Full-text available
Mobile agent is a software object that migrates through many nodes of a heterogeneous network of computers under its own control in order to perform task using resources of these nodes, during the past several years, mobile agent has received significant attention. Not only in the wide range of commercial and law enforcement applications, but also...
Article
The development of e-recruitment system is web-based tool used in order to reduce communication gap between job seekers and employers. E-recruitment, also known as online recruitment, is the practice of using technology and in particular Web-based resources for tasks involved with finding, attracting, assessing, interviewing and hiring new personne...
Article
Full-text available
This paper presents a GSM based electronic appliances monitoring and controlling system. This enables individuals to connect their home or office electronic appliances to the developed system which in turn enables them to remotely monitor and control these appliances though a Short Message Service (SMS). In remotely controlling the connected electr...
Article
Full-text available
A mobile agent is a software entity that migrates from one host to another, performing data collection and software configuration tasks on behalf of users in distributed networks. However, studies have shown that the existing pull – all data strategy of mobile agent migration pattern moves data from one host to the next host along with the mobile a...

Network

Cited By