Papers by Adegoke Ojeniyi

Journal of Electrical and Computer Engineering
Particle swarm optimization algorithms (PSOA) is a metaheuristic algorithm used to optimize compu... more Particle swarm optimization algorithms (PSOA) is a metaheuristic algorithm used to optimize computational problems using candidate solutions or particles based on selected quality measures. Despite the extensive research published, studies that critically examine its recent scientific developments and research impact are lacking. Therefore, the publication trends and research landscape on PSOA research were examined. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) and bibliometric analysis techniques were applied to identify and analyze the published documents indexed in Scopus from 2001 to 2021. The published documents on PSOA increased from 8 to 1,717 (21,362.50%) due to the growing applications of PSOA in solving computational problems. “Conference papers” is the most common document type, whereas the most prolific researcher on PSOA is Andries P. Engelbrecht (South Africa). The most active affiliation (Ministry of Education) and funding organizati...

Applied Computational Intelligence and Soft Computing
A recommender system is an information selection system that offers preferences to users and enha... more A recommender system is an information selection system that offers preferences to users and enhances their decision-making. This system is commonly implemented in human-computer-interaction (HCI) intervention because of its information filtering and personalization. However, its success rate in decision-making intervention is considered low and the rationale for this is associated with users’ psychological reactance which is causing unsuccessful recommender system interventions. This paper employs a computational model to depict factors that lead to recommender system rejection by users and how these factors can be enhanced to achieve successful recommender system interventions. The study made use of design science research methodology by executing a computational analysis based on an agent-based simulation approach for the model development and implementation. A total of sixteen model concepts were identified and formalized which were implemented in a Matlab environment using thre...

International Journal of Data Science
The key component that makes the detection of android malware possible is the availability of the... more The key component that makes the detection of android malware possible is the availability of the right triggers and pointers, which are found in the Android application packages, known as features or attributes. These are fundamental in the training of the different machine learning algorithms to produce the required detection model. The process of extracting these attributes or features, from the Android application packages, is known as reverse engineering. This paper delved into the experimental detail processes of applying reverse engineering procedure, using Sublime Text 2 and Androguard Plugin, on Android Application packages for the extraction of, particularly permissions, which are the targeted features. The study further discussed the cleaning stages, using NotePad++, Microsoft Excel Worksheet, and MS Word, to sort out all the relevant and important features by removing all the noisy ones. A total of 1500 Android apps were downloaded from both benign and malicious sources ...

International Journal of Informatics and Communication Technology, Aug 1, 2022
A persuasive agent makes use of persuasion attributions to ensure that its predefined objective(s... more A persuasive agent makes use of persuasion attributions to ensure that its predefined objective(s) is achieved within its immediate environment. This is made possible based on the five unique features namely sociable, persuasive, autonomy, reactive, and proactive natures. However, there are limited successes recorded within the behavioural intervention and psychological reactance is responsible for these failures. Psychological reactance is the stage where rejection, negative response and frustration are felt by the users of the persuasive system. Thus, this study proposes a persuasive agent (PAT) architecture that limits the experience of psychological reactance to achieve an improved behavioural intervention. PAT architecture adopted the combination of the reactance model for behavior change and the persuasive design principle. The architecture is evaluated by conducting an experimental study using a user-centred approach. The evaluation reflected that there is a reduction in the number of users who experienced psychological reactance from 70 per cent to 3 per cent. The result is a better improvement compared with previous outcomes. The contribution made in this study would provide a design model and a steplike approach to software designers on how to limit the effect of psychological reactance on persuasive system applications and interventions.

BioMed Research International
Wireless sensor network (WSN) is made up of tiny sensor nodes. The application of WSN in diverse ... more Wireless sensor network (WSN) is made up of tiny sensor nodes. The application of WSN in diverse fields has seen a tremendous escalation in recent years. WSN applications are constrained by the limited set of computing resources possessed by the sensor nodes and the security aspects of data communication in the WSN. Many algorithms based on nature-inspired optimization (NIO) have been proposed in the past to optimize the issue of energy efficiency and security in WSN. In the proposed work, two opportunistic routing algorithms, i.e., intelligent opportunistic routing protocol (IOP) and trust-based secure intelligent opportunistic routing protocol (TBSIOP), are compared against two NIO algorithms developed for achieving energy efficiency and security in WSN for performance analysis. The performance is evaluated by simulating the algorithms on MATLAB and comparing the obtained results with existing ACO-based and PSO-based routing algorithms. It is observed that the TBSIOP outperforms t...

Applied Energy, 2012
Thermal performance of windows depends on many parameters, such as dimensional characteristics an... more Thermal performance of windows depends on many parameters, such as dimensional characteristics and material properties of the components. The thermal transmittance U can be evaluated by a numerical method based on the CFD approach for the evaluation of the frame U-value (ISO 10077-1, ISO 10077-2) or by experimental campaigns on window prototypes, according to ISO 12657-1; in both cases significant effort and time are required. The paper aims at developing an artificial neural network (ANN) model to predict the U-value of wooden windows, with the same accuracy of the numerical calculation procedure cited above (therefore greater than the one of the simplified method), but in real time and on the basis of a limited number of parameters. In particular, after a preliminary analysis, only 10 main parameters were selected as network inputs: window typology (windows and French windows), wood kind (hardwood and softwood), frame and shutters thickness, glazing spacer, top frame junction characteristics (size and number of small and large non-ventilated air cavities), U-value of the glazing and glazing size; the U-value of the window is the ANN output. Data set for the training and test of the ANN model consist of respectively 256 and 26 wooden window samples (windows and French windows). In such hypothesis, the developed ANN model, based on a multilayer feed-forward architecture, provides in real time the evaluation of the window U-value with an error of about 1% with respect to the results provided by the CFD numerical procedure), obviously when the input parameters vary within appropriate ranges (corresponding to the variation range of the data used for the network training). The ANN model setup , therefore, allows to easily determine with high accuracy the thermal performance of wooden windows, saving both money and time. A sensitivity analysis of the main design parameters was also carried out.

Hindawi BioMed Research International, 2022
Wireless sensor network (WSN) is made up of tiny sensor nodes. The application of WSN in diverse ... more Wireless sensor network (WSN) is made up of tiny sensor nodes. The application of WSN in diverse fields has seen a tremendous escalation in recent years. WSN applications are constrained by the limited set of computing resources possessed by the sensor nodes and the security aspects of data communication in the WSN. Many algorithms based on nature-inspired optimization (NIO) have been proposed in the past to optimize the issue of energy efficiency and security in WSN. In the proposed work, two opportunistic routing algorithms, i.e., intelligent opportunistic routing protocol (IOP) and trust-based secure intelligent opportunistic routing protocol (TBSIOP), are compared against two NIO algorithms developed for achieving energy efficiency and security in WSN for performance analysis. The performance is evaluated by simulating the algorithms on MATLAB and comparing the obtained results with existing ACO-based and PSO-based routing algorithms. It is observed that the TBSIOP outperforms the NIO-based algorithms in terms of energy efficiency, network lifetime, packet delivery ratio, end-to-end delay, and average risk level. All the parameters under consideration are recorded in the presence of a maximum of 50% malicious nodes for 25, 50, and 100 nodes' test cases. The increasing size of the network has a significant effect on the performance of TBSIOP, as the packet delivery ratio is close to 100%. Also, TBSIOP can easily avoid malicious nodes during the routing process as reflected from the results. This will improve the network lifetime of TBSIOP compared to other protocols. As far as the application of the work is concerned, it would be beneficial for smart healthcare services. It can also help in better communication during the sharing of data by providing energy-efficient services and keeping the network alive for a longer period.

Queues form an indispensible part of our everyday lives. They occur whenever there is competition... more Queues form an indispensible part of our everyday lives. They occur whenever there is competition for limited resources. For example, we line up in queues outside doctors' offices and supermarket checkout counters; airplanes queue along airport runways. Therefore, our ability to model and analyse systems of queues helps to minimize their inconveniences and maximize the use of the limited resources. In this paper, a queuing system comprising of two- phase hyper-exponential inter-arrival time, Erlang-3 distributed service time, single server and infinite number of arrivals has been investigated in order to provide some insight into the analysis of phase type distributions queues. This is carried out by using procedure for solving phase-type queuing systems by means of the matrix-geometric approach namely, construction of the block sub-matrices, forming the Neuts R matrix, solving the boundary equations and generating the successive components of the solution. <br>

International Journal of Engineering and Advanced Technology, 2019
Traffic control system is an imperative instrument in traffic management and smart urban developm... more Traffic control system is an imperative instrument in traffic management and smart urban development. However, most of the current traffic control systems cannot intercommunicate nor interact with each other. Most importantly, none of these systems are proactive and reactive to their immediate traffic environment. Thus, this study explores the design of an agent-based traffic control system where traffic lights can interact and inter-communicate to take prompt traffic control decisions within a traffic area. The study presents an agent-based traffic control system known as ATC. ATC system design was done using Design Science Research Process Model while the system was evaluated using qualitative research methodology. The study argues that there is need for traffic control system to be more reactive and proactive to their immediate traffic environment in order to limit traffic jam in urban areas.

International Journal on Advanced Science, Engineering and Information Technology, 2016
Agent applications have been widely used in behaviour change intervention nowadays. This is due t... more Agent applications have been widely used in behaviour change intervention nowadays. This is due to the four features of agents: proactive, reactivity, social ability and autonomy. However, psychological reactance is one of the major limiting causes of agent interventions. Although, many studies have investigated into both psychological reactance and behaviour change nevertheless how reactive intervention can be supported to obtain an improved behaviour change intervention is still lacking in most previous studies. Therefore, this paper describes the formal analysis of agent support model for behaviour change intervention. The analysis made use of two widely accepted approaches in agent formal evaluation namely mathematical analysis and automated verification. The mathematical analysis examined the correctness of the formal model representation and formalization that aimed to ensure that all syntax and semantic representations used in the formal model is consistent. The mathematical analysis used equilibrium property to explore the formal model consistency. Likewise, automated verification depicts the checking of the model properties against its specifications and theoretical traces. The automated verification used Temporal Trace Language (TTL), which verifies the model properties and states against generated traces. The paper presents an agent support model that allows building agent-based software and applications that deflect psychological reactance and enhance an improved behavioural change intervention.

Belief-Desire-Intention (BDI) model is well suited for describing agent's mental state. The BDI o... more Belief-Desire-Intention (BDI) model is well suited for describing agent's mental state. The BDI of an agent represents its motivational stance and are the main determinant of agent's actions. Therefore, explicit understanding of the representation and modelling of such motivational stance plays a central role in designing BDI agent with successful behavioural change interventions. Nevertheless, existing BDI agent models do not represent agent's behavioural factors explicitly. This leads to a gap between design and implementation where psychological reactance has being identified as the cause of BDI agent behavioural change interventions failure. Hence, this paper presents a generic representation of BDI agent model based on behavioural change and psychological theories. The objective of this proposed BDI agent model is to bridge the gap between agent design and implementation for successful agent-based interventions. The model will be realized in an agent-based application that motivates children towards oral hygiene.

Jurnal Teknologi, 2015
Belief-Desire-Intention (BDI) model is well suited for describing agent's mental state. The BDI o... more Belief-Desire-Intention (BDI) model is well suited for describing agent's mental state. The BDI of an agent represents its motivational stance and are the main determinant of agent's actions. Therefore, explicit understanding of the representation and modelling of such motivational stance plays a central role in designing BDI agent with successful behavioural change interventions. Nevertheless, existing BDI agent models do not represent agent's behavioural factors explicitly. This leads to a gap between design and implementation where psychological reactance has being identified as the cause of BDI agent behavioural change interventions failure. Hence, this paper presents a generic representation of BDI agent model based on behavioural change and psychological theories. Also, using mathematical analysis the model was evaluated. The objective of the proposed BDI agent model is to bridge the gap between agent design and implementation for successful agent-based interventions. The model will be realized in an agentbased application that motivates children towards oral hygiene. The study explicitly depicts how agent's behavioural factors interact to enhance behaviour change which will assist agent-based intervention designers to be able to design intervention that will be void of reactance.

2015 International Symposium on Agents, Multi-Agent Systems and Robotics (ISAMSR), 2015
Low temperature fuel cells (LTFCs) are considered as clean energy conversion systems and expected... more Low temperature fuel cells (LTFCs) are considered as clean energy conversion systems and expected to help address our society energy and environmental problems. Up-to-date, oxygen reduction reaction (ORR) is one of the main hindering factors for the commercialization of LTFCs, because of its slow kinetics and high overpotential, causing major voltage loss and short-term stability. To provide enhanced activity and minimize loss, precious metal catalysts (containing expensive and scarcely available platinum) are used in abundance as cathode materials. Moreover, research is devoted to reduce the cost associated with Pt based cathode catalysts, by identifying and developing Pt-free alternatives. However, so far none of them has provided acceptable performance and durability with respect to Pt electrocatalysts. By adopting new preparation strategies and by enhancing and exploiting synergetic and multifunctional effects, some elements such as transition metals supported on highly porous carbons have exhibited reasonable electrocatalytic activity. This review mainly focuses on the very recent progress of novel carbon based materials for ORR, including: (i) development of three-dimensional structures; (ii) synthesis of novel hybrid (metal oxide-nitrogen-carbon) electrocatalysts; (iii) use of alternative raw precursors characterized from three-dimensional structure; and (iv) the co-doping methods adoption for novel metal-nitrogen-doped-carbon electrocatalysts. Among the examined materials, reduced graphene oxide-based hybrid electrocatalysts exhibit both excellent activity and long term stability.

Jurnal Teknologi, 2015
The successful implementation of outsourcing project within the manufacturing industries has lot ... more The successful implementation of outsourcing project within the manufacturing industries has lot of benefits to all party involved however, the management of such project come with huge pain and losses to the parties. Thus, this paper explores project management strategies in outsourcing best practices within Malaysia manufacturing sector. The study made use of quantitative research methodology by utilizing questionnaire for data collection through postal survey medium. The Malaysian Electrical and Electronic industries were chosen as the sample population where 865 organizations were considered based on Federation of Malaysian Manufacturer directory. The result of this study identified seven major project management strategies for outsourcing best practices namely communication management, performance management, knowledge transfer management, relationship management, crisis management, risk management and cost management. These strategies will guide the relationship between suppl...

Online banking user interface: Perception and attitude
2015 International Conference on Computer, Communications, and Control Technology (I4CT), 2015
Online banking user interface gives customers' the platform to link-up their bank servers and... more Online banking user interface gives customers' the platform to link-up their bank servers and conduct transactions over the Internet. It provides both customers and banks with great opportunities. Security and privacy are one of the big issues that banks are contending with to survive the global competitive banking market. Many technological innovation and solution are being suggested to combat these issues. However, these solutions are making banking user interface more complicated and complex which is affecting the simple and clear natures of an ideal banking user interface. Thus, this paper aim at examining customers' perception and attitude toward the ease of use of online banking interface in Nigeria commercial bank. The study will probe on how advancement on online banking user interface securities feature affect customers' attitude and intention to use the interface. The investigation of this study was done in the light of Technological Acceptance Model (TAM). A survey was carried out on 500 respondents in Nigeria out of which 356 were usable, giving a response rate of 71.2 percent. Data were analyzed by employing descriptive analysis using SPSS. Findings of the study indicates that as banks are providing more security measures on their online banking user interface, similarly attention should be given to ease of use of the interface. Consequently, if banks can ensure that both security and ease of use are integrated on their user interface, customers will have more confidence in adoption and usage of online banking user interfaces without hesitations.

Jurnal Teknologi, 2015
Purpose: ERP implementation comes with huge business competitive advantages nevertheless it also ... more Purpose: ERP implementation comes with huge business competitive advantages nevertheless it also has its difficulties and challenges. This paper presents the findings of field work and interview conducted on issues and challenges of ERP implementation on small and medium enterprises (SMEs). It proposes implementation strategies at each of the implementation stages for a successful ERP implementation within SMEs. Design/methodology/approach: The study employed both personal interview and observation methods. Findings: The findings revealed that reengineering (organization and infrastructures), top management commitment, funds, skilled manpower, implementation time and data fill-in were the critical issues and challenges faced by SMEs during ERP implementation. Hence, these factors were identifies as ERP implementation successful factors to be considered by SMEs. Also the study proposed three implementation strategies stages which will enhance successful ERP implementation in the SMEs...

The successful development of Information System (IS) is not high even with enormous interest and... more The successful development of Information System (IS) is not high even with enormous interest and fund committed by organizations on this new technology. It has been revealed that a combination of insufficient and unsuitable project management issues are responsible for this low rate of IS development. This paper presents the findings of the fieldwork and interview conducted on the challenges and difficulties of system development project. The study employed both personal interview and observation methods. The findings revealed that fund, infrastructures (hardware and software), manpower, management commitment, monitoring and inspection were the critical challenges and difficulties faced by organizations during their system development. Therefore, the study concludes that fund, infrastructures (hardware and software), manpower, management commitment, monitoring and inspection play crucial role for an effective system development. Our study recommends that there should be sufficient ...

This paper presents the findings of the field work and interview conducted on the challenges and ... more This paper presents the findings of the field work and interview conducted on the challenges and difficulties of system development at the Perbadanan Hal Ehwal Bekas Angkatan Tentera (PERHEBAT) or Armed Forces Ex-servicemen Affairs Corporation. The study employed both personal interview and observation methods. The findings revealed that infrastructures (hardware and software), manpower, materials, methods and fund were the critical challenges and difficulties faced by PERHEBAT during their system development. Therefore, the study concludes that infrastructures, manpower, materials, methods and fund play crucial role for an effective system development. Our study recommends that there should be sufficient budget to procure the right system hardware and software for right requirements. Secondly, training of staff for both IS development and management should be given urgent attention.

Modelling of Global Solar Radiation Using a Simple Atmospheric Parameters for a Tropical Area
4th Annual International Conference on Sustainable Energy and Environmental Sciences (SEES 2015), 2015
The knowledge and estimation of solar radiation are very important in utilization of solar energy... more The knowledge and estimation of solar radiation are very important in utilization of solar energy at any particular location especially when there is lack of measuring.In this study, meteorological parameters were used to model global solar radiation for solar energy applications.This was done by developing a number of regression equations for predicting daily/monthly solar radiation in Ogbomoso.Ogbomoso is a tropical area in the western part of Nigeria with Latitude 8.3" and logitude 4.2'E.The regression equations were obtained by modifying an existing Angstron equation as the base.The performance of these correlated models as global solar radiation estimators were evaluated by comparing the predicted values with the measured ones.Different statistical analyses were employed to examine the mathematical models.From the results, it is deduced that all the fits were consistent with the measurement but the quadratic model appeared to be the best of all the models which produced R2 of 95.3% the power model had the least R2 of 83.7%.The quadratic model proposed was compared with some existing quadratic models for some tropical stations and it was observed that the proposed quadratic models for some tropical stations and it was observed that the proposed quadratic equation KTP = 0.461+0.039T-0.001T2 is well correlated for the study area.Hence, the proposed model can be employed in designing of any solar energy applications in the study area and recommend for any other areas having similar characteristics with the area of study.
Random-walk simulation of the dielectric constant of a composite material
Physical Review B, 1990
We evaluate, by a random-walk method, the dielectric constant εe of a composite material consisti... more We evaluate, by a random-walk method, the dielectric constant εe of a composite material consisting of impenetrable, spherical conducting inclusions embedded in an insulating matrix. The random-walk method permits an accurate evaluation of εe up to volume fractions corresponding to near to close packing of the inclusions. We compare the εe results for different types of random configurations with those
Uploads
Papers by Adegoke Ojeniyi