Yekini Nureni

Yekini Nureni
Yaba College of Technology · DEPARTMENT OF COMPUTER ENGINEERING

Doctor of Philosophy

About

84
Publications
907,884
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
159
Citations

Publications

Publications (84)
Conference Paper
Full-text available
In an institutions of learning attendance in the classroom is paramount to achievement of education goals. Some institution uses attendance system to make vital decisions like qualification for participation in examination, absence from lecture by lecturer/student etc. Classroom attendance monitoring & tracking system is a sin-qua-non educational t...
Article
Full-text available
This study is on the contribution of public private partnership (PPP) to education development by generating revenue to sustain the infrastructure and academic decency of Yaba College of Technology, Lagos in Nigeria. Higher Education is a veritable tool for socio-economic development of any country. Training and educating society are the key influe...
Conference Paper
Full-text available
COVID-19 pandemic that resulted to lockdown in Nigeria and other parts of the world made eLearning a normal norm in teaching and learning. This work is focused on evaluation of engineering students' preference on eLearning & face-to-face after COVID-19. We conducted Survey in Lagos State Nigeria using Yaba College of Technology and Lagos State Poly...
Article
Full-text available
Sightless or visual impaired person face with several difficult in life, one of the problem is limitation in mobility or basically navigation around places due to inability to detect the obstacles in front of them which can result to accident and possible loss of movement pathway. This work is focus on design of electronic navigation aid and tracki...
Article
Full-text available
Leakage of gas is a major issue in the industrial sector, residential buildings, and gas-powered vehicles, one of the preventive methods to stop accidents associated with gas leakage is to install gas leakage detection devices. The focus of this work is to propose a device that can detect gas leakage and alert the owners to avert problems due to ga...
Conference Paper
Full-text available
In this research paper the concept of embedded systems, its applications as well as the economic importance in the modern technology was reviewed. Embedded systems are not only one of the most important fields for current computer-based applications; they are also one of the most difficult fields of software engineering: embedded systems must meet...
Conference Paper
Full-text available
Academic Staff Union of Polytechnics (ASUP) Zone C 6TH National Conference 2022. Theme: The Position of Polytechnics, Monotechnics, and Specialized Institutions in Combating Skilled Manpower Shortage In Nigeria. Venue: Federal Polytechnic Ile-Oluji Ondo State. 19th – 22nd July 2022.
Conference Paper
Full-text available
This study presents the design and implementation of Electronic Photograph Archives & Display System with remote access control that display collection of photographs. The focus of this work is to digitalize the collection of portraits of occupants of an office in an organization at a designated time interval. It is a common phenomenon that picture...
Book
Full-text available
The objective of this book is to provide adequate theoretical and practical knowledge on Computer Networking and Data Communication System for undergraduate students of Computer Science and Engineering, Network Engineer and Administrators, researchers and instructors. This book introduces the basic principle, theories and practical of Computer Net...
Article
Full-text available
New public transport planning requirements are developed as many countries start to navigate their return to normality after the COVID-19 lockdown. This study combines key developments regarding public transportation and effect of the lockdown on energy utilization during the first and second wave of COVID-19 pandemic in Nigeria. Data were sourced...
Article
Full-text available
The concept of neuromorphic computing was initially meant to describe the use of electronic systems that operate by the same physics of computation used by the human nervous system; it now represents a wider concept that bridges computing systems and neural systems in both directions. Neuromorphic computing is a method of computer engineering in wh...
Article
Full-text available
One of the major components of the photovoltaic energy generation system is solar panel system that collects rays of sunlight that will be converted to electricity as alternative energy source. The amount of sun energy receive by solar panel(s) determine the energy output of electricity generated. The solar panel(s) for the photovoltaic system coul...
Article
Full-text available
The concept of neuromorphic computing was initially meant to describe the use of electronic systems that operate by the same physics of computation used by the human nervous system; it now represents a wider concept that bridges computing systems and neural systems in both directions. Neuromorphic computing is a method of computer engineering in wh...
Conference Paper
Full-text available
Security is state of being free from danger or threat. In recent time the issue of security has been a subject of concern to Nigerians and their properties. Farm security in this era of invasion by armed bandits and criminal herdsmen require a proactive approach that will enhance the protection of the fisheries and farm owners towards better produc...
Conference Paper
Full-text available
Cooling is important for better performance of combustion engine. The cooling process is done by radiators which are heat exchangers. Engines are cooled by passing a liquid known as engine coolant through the engine block, where it is heated, then through a radiator, where it loses heat to the atmosphere, and finally back to the engine. A water pum...
Article
Full-text available
Insecurity in Nigeria has shown significant growth thereby showing the flaws in the security system of the nation. This has led to the citizens clamoring for a system that works in tackling the potential and future security threats. The perpetrators of the criminal are majorly the intruders. E-security monitoring and criminal evidence system is a g...
Conference Paper
Full-text available
Ups and downs in science and technology have led to new discoveries. In the traditional approach to computing (classical computing), a bit is either ON or OFF, a modern approach to computing in the twenty centuries are machines that use that uses quantum technology to store data and perform computation unlike classical computer the basic unit of me...
Article
Full-text available
In today's modern world, most businesses, regardless of size believes that access to the internet is essential to compete effectively in the industry. Yet, connecting a personal or corporate computers to the internet could expose personal or confidential data to malicious attack from anywhere since unprotected connections to the internet makes comp...
Article
Full-text available
During COVID-19 lockdown, citizens were told to stay in door in other to break the chain of transmission of the pandemic. It is difficult for a normal human being to stay indoor for days without any form of communication to the outside world. The only mode of communication available to the outside word during the lockdown is digital communication v...
Article
Full-text available
During COVID-19 lockdown, citizens were told to stay in door in other to break the chain of transmission of the pandemic. It is difficult for a normal human being to stay indoor for days without any form of communication to the outside world. The only mode of communication available to the outside word during the lockdown is digital communication v...
Conference Paper
Full-text available
This paper appraised the adoption of eLearning in some selected institutions of learning during COVID-19 pandemic. Questionnaire was designed to collect data related to teaching and learning experience from sampled population comprising students and teachers from selected higher institutions of learning within southwest geopolitical zone of the Fed...
Conference Paper
Full-text available
Computer waste is an integral component of e-waste. This work present a general assessment of computer waste management and it implication on society. Survey of computer waste disposal and management was done by visiting three major dumping site in Lagos state, interaction with the computer repair and technicians within Lagos State, and records ins...
Research
Full-text available
The paper conducts an investigative study into the uses and applications of information and communication technology (ICT) for sustainable tourism development (STD) with particular reference to security control and management in tourist centres across Nigeria. The researcher collected data to measure level of adoption and usage of ICT within touris...
Article
Full-text available
There are so many innovations in various fields of science and engineering, one among other is the use of solar powered devices. This piece of work is centred on an air multiplier. Although an air multiplier does not necessarily mean a fan without blades, rather it means that there are no visible blades. An additional feature to this is that it can...
Conference Paper
Full-text available
Article
Full-text available
The use of LED display system has replaced traditional methods of dissemination information to large and moderate audience in various places both private and public. In recent time the use of LED display system has metamorphose to various categories of usage like advertisement bill board, Time table of events and academic activities in some institu...
Article
Full-text available
Handling of chronic disease in Nigeria health care system is perfunctory as illnesses that require long-term monitoring get very little or no attention due to lack of proper facilities to handle such cases. Use of traditional mode of patient monitoring system where patient visit hospital to see doctor is still order of the day in our hospitals. Hen...
Conference Paper
Full-text available
This paper presents the report of survey of the causes and effects of electricity theft from power distribution in Nigeria. Questionnaire was used to gather information from the various electricity consumers around Sango-Ota axis in Ogun state Nigeria. The questionnaire was focused on availability of power, billing processes, and mode of payment fo...
Article
Full-text available
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members...
Article
Full-text available
Voter registration helps to facilitate the credibility of the electoral process by preventing multiple voting as each person is only allowed to register once. One out of many causes of disenfranchisement of register voter is the failure to transfer their Voter Registration from one place to another when the case arises. That scenario has led to mul...
Article
Full-text available
The shortest path problem is an approach towards finding the shortest and quickest path or route from a starting point to a final destination, four major algorithms are peculiar to solving the shortest path problem. The algorithms include Dijkstra's Algorithm, Floyd-Warshall Algorithm, Bellman-Ford Algorithm and Alternative Path Algorithm. This res...
Article
Full-text available
In recent time the use of communication gadgets (mobile phones, laptop, desktop etc.) and service for online communication between two parties over a long distance has become sine-qua-non. Some criminal minded people are using this online communication method to deceive their prey via proxy communication where individual claiming to be discussing i...
Article
Full-text available
This paper gives the report of the experimental setup to evaluate the effectiveness of Hybrid blended learning system (HBLS) in teaching mathematics among engineering students in Nigeria. A total of 1197 students was sampled. We first conducted and investigative research with questionnaire to assess the student's readiness to use of social medias n...
Article
Full-text available
Quality assurance in education system is paramount to the global sustainable development, therefore conventional surveillance systems that use cameras and process large amounts of data to extract features from a classroom environment may be essential. This work presents the design and implementation of automated classroom monitoring and security sy...
Article
Full-text available
This paper gives the report of the experimental setup to evaluate the effectiveness of Hybrid blended learning system (HBLS) in teaching mathematics among engineering students in Nigeria. A total of 1197 students was sampled. We first conducted and investigative research with questionnaire to assess the student's readiness to use of social medias n...
Article
Full-text available
Quality assurance in education system is paramount to the global sustainable development, therefore conventional surveillance systems that use cameras and process large amounts of data to extract features from a classroom environment may be essential. This work presents the design and implementation of automated classroom monitoring and security sy...
Article
Full-text available
Survey was conducted to gather information on potential adverse health effects of Mobile Phones, and Telecommunication Tower Base Stations in Nigeria. Data was sourced from two sampled populations. Firstly from the people living in close proximity to base stations, and secondly from cell phone users.Questionnaire was used to gathered information fr...
Article
Full-text available
Desktop computer system been DIY (assembled) or Branded has become sine-qua-non compare to other tools in business organizations like banks and schools. This desktop computer requires clean electricity power to operate. Supply of clean and uninterrupted electricity power is compulsory to keep computer running and also for maintains and preventing o...
Article
Full-text available
Survey was conducted to gather information on potential adverse health effects of Mobile Phones, and Telecommunication Tower Base Stations in Nigeria. Data was sourced from two sampled populations. Firstly from the people living in close proximity to base stations, and secondly from cell phone users.Questionnaire was used to gathered information fr...
Conference Paper
Full-text available
Advancement in information and communication technology (ICT) is making video streaming a viable way of getting a real-time event to people anywhere in the world through computer systems and handheld devices. In teaching and learning, ICT have successfully added values to the process through the Internet. In this research, the process of delivering...
Article
Full-text available
This paper presents automobile tracking system with audio surveillance using GPS and GSM Module to provide an alternative solution to security challenges experienced by car owner, and to develop a system that can track the location of vehicles. We make use of Microcontroller Unit, GPS, and GSM unit. The design is an embedded application, which will...
Conference Paper
Full-text available
Cyberspace is the boundless space through which communication takes place on global network. In this modern day of computer interconnectivity, and available bandwidth. Several criminal behaviors have been attributed to the use of cyberspace. Some of these challenges are discussed in this paper. The emergences of the challenges required that proper...
Conference Paper
Full-text available
We conducted and investigative research into management of national assembly system in Nigeria. Our investigation was focused on the cost of managing and relevance of the national assembly member's roles to Nigeria. The method used for data collection in this research is record inspections via open access resource. It was discovered from the data c...
Article
Full-text available
Security against hazard is a vital concern for everyone. In recent past years, some alarm systems and intelligent control apparatus has been designed and developed in order to increase safety in automobile system. This research work is focus on design and development of an automobile hazard alert system using different sensors. A glass breakage sen...
Article
Full-text available
EATM is an electronic banking outlet that allows banks customers to complete one or more banking transactions without the aid of any bank official or teller. It is a self-service technology in financial service delivery usually adopted by financial institutions to reach their customers outside the banking hall. The user of existing EATM machine use...
Article
This paper present the design and implementation of computer assisted learning system (CALS) for teaching students of mechanical and computer engineering students' integral calculus in mathematics. The system was integrated into traditional method of facet face teaching methods thereby result to blended learning approach. While some students taught...
Article
Full-text available
This paper is focus on the Refocusing Computer Engineering and Computer Sciences Education for Economic Sustainability and Local Input Contents of Computer and mobile phones in Nigeria. There is over ten millions computer system, and more than hundred millions mobile phones in use in Nigeria. All hardware, software and accessories of the computer s...
Article
Full-text available
We conducted an experimental Analysis of security platform in some millennium vehicles across Nigeria through the use of questionnaire, observation, and oral interview within the automobile dealers, vehicle owners and users within Lagos Nigeria. Our aim/objectives is to investigate, compare, and contrast the available anti-theft systems in the mill...
Conference Paper
Full-text available
This paper presents a robust cloud-based Automobile Recognition and Tracking system method of license plate detection and recognition using cloud computing. Cloud computing is now an emerging tool in this era of internet proliferation. Cloud-based automobile recognition and tracking system (carts) is a cloud-based system for identify the vehicle an...
Conference Paper
Full-text available
There is no doubt to the unlimited future of enhancing quality, and globalising education through the use of information and telecommunication technologies (ICT). The capability of students and staffs of higher institutions in adopting the usage of online resources and technologies has been described as one of the most important capabilities that t...
Conference Paper
Full-text available
The National Software Policy (NSP) of 2011 by the National Information Technology Development Agency (NITDA) has, as one of its policy statements that "Government shall deploy the political will and national resources with the support of the private sector to promote mass development of software human capital that is critical for job creation, entr...
Article
Full-text available
In a Computer Internetwork, congestion control is concerned with allocating the resources in a network such that the network can operate at an acceptable performance when the demand exceeds or is near the capacity of the network resources. These resources include bandwidths of links, buffer space that is memory, and also processing capacity at inte...
Conference Paper
Full-text available
In this paper, we present a study conducted to find a correlation between the students’ interest in software engineering, computer programming and computer ergonomic effects among Nigerian students. Information was gathered among undergraduate students of computer sciences and computer engineering. Questionnaires were used to gather the information...
Conference Paper
Full-text available
Entrepreneurship is now becoming an important means and a valuable additional strategy to create jobs and improve livelihoods and economic independent in Africa continents. Problems of unemployment as experienced in the past and present Africa of ours have contributed to all source of vices in our society such as political hooliganism, armed robber...
Article
Full-text available
The process of transforming plaintext data into cipher text in order to conceal its meaning in case it fall to hand of unauthorized recipient is refers to as encryption. The systems that perform the encryption processes are known as cryptosystems, there are several cryptosystem algorithms: RSA, RC4, DES, 3DES, Blowfish, AES, IDEA, Skipjack, DSA, El...
Article
Full-text available
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sende...
Book
Full-text available
The objective of this book is to introduce students of Accountancy & Finance, Business Administration, Marketing, Banking & Finance, and Office Technology Management of Nigeria Polytechnics and Colleges of Technology to modern Information Communication Technology (ICT), Data Processing and Its Applications. This book provides basic theoretical and...
Article
Full-text available
A social issue, challenges, ill is an issue that relates to society's perception of people's personal lives. Different societies have different perceptions and what may be "normal" behavior in one society may be a significant social issue in another society. Obesity is a prevalent social problem in today's society, with rates steadily increasing. O...
Conference Paper
Full-text available
The use of computer has become sin qua non in all areas of human endeavor. This research paper conducts an investigative study on effect of computer application on attainment of educational goals in science and technical education. The researchers developed computer application software (computer-Based Learning system). Research methodology-compare...
Book
Full-text available
The objective of this book is to introduce students of Computer Sciences, Accountancy & Finance, Business Administration, Statistics and Food Technology, of Nigeria Polytechnics and Colleges of Technology to modern Management Information System and Its Application. This book provides basic theoretical and practical information on all aspect of Man...
Article
Full-text available
The use of computer has become sin qua non in all areas of human endeavor. This research paper conducts an investigative study on effect of computer application on attainment of educational goals in science and technical education. The researchers developed computer application software (computer-Based Learning system). Research methodology-compare...
Article
Full-text available
_______________________________________________________________________________AbstrtTThe purpose of this project work is to evaluate the Transmission Control Protocol Model in a ClientServer network. The transmission of data is between two host; client and server. Simulation and Evaluation of TCP Model is carried out using Network Simulator OMNet+...
Article
Full-text available
The use of Information Technologies have played and currently playing prominent roles in many organizations, such as business, education, commerce. The tourism industry has witnessed the use and application of various computer-based systems in carrying out one or more activities or operation. But currently there is no computer-based system tourist...
Conference Paper
Full-text available
The focus of this research work was to develop a sustainable real-time e-learning system with the contents to be delivered via the Internet using online real-time processing techniques. We present the framework of the model of real-time e-learning system to reduce congestion in Nigeria higher institutions using Yaba College of Technology as a case...