Emmanuel Ajayi Olajubu
Obafemi Awolowo University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Emmanuel Ajayi Olajubu.
Archive | 2008
Emmanuel Ajayi Olajubu; Ganiyu A. Aderounmu; Emmanuel R. Adagunodo
In this paper we propose light-weight-agent as an efficient and effective tool for implementing data communication network bandwidth optimization and response time. The routing model for the agents is based on TSP algorithms. Performance comparison was carried out among RPC, Single Mobile Agent and tiny agents otherwise referred to as lightweight agents on the basis of bandwidth usage and response time. The performance evaluation shows the superiority of lightweight agents over the other schemes in terms of bandwidth usage and the response time.
Cogent engineering | 2016
A.O. Akinwunmi; Emmanuel Ajayi Olajubu; G.A. Aderounmu
Abstract Harnessing the benefits of cloud computing, demands that a potential user has adequate access to trustworthy cloud services. Locating resources and services in a heterogeneous network such as cloud environment may be a tedious task. The cloud computing is a form of distributed system with a complex aggregation of computing resources from different domains with different administrative policies but having immense benefits that could enhance the mode of computing. Discovering cloud services is complicated by the varied level of quality of service offered by the different providers, hence a monolithic approach to cloud service discovery cannot effectively support the cloud environment. This work proposed a distributive approach to discovering trustworthy cloud services with the use of Multi-Agents System for achieving intelligent cloud service discovery. Simulation experiments were carried out and the results showed that extending the Multi-Agents System approach by integrating trust into the process of cloud service discovery improves the quality of service in terms of response time and scalability. A further comparative analysis of Multi-Agents System approach for cloud service discovery to monolithic approach showed that it is highly efficient, and highly flexible for trustworthy cloud service discovery.
ubiquitous computing | 2016
Akinboro Solomon; Emmanuel Ajayi Olajubu; Ibrahim Kazeem Ogundoyin; Ganiyu A. Aderounmu
This study designed, simulated and evaluated the performance of a conceptual framework for ambient ad hoc home network. This was with a view to detecting malicious nodes and securing the home devices against attacks. The proposed framework, called mobile ambient social trust consists of mobile devices and mobile ad hoc network as communication channel. The trust model for the device attacks is Adaptive Neuro Fuzzy ANF that considered global reputation of the direct and indirect communication of home devices and remote devices. The model was simulated using Matlab 7.0. In the simulation, NSL-KDD dataset was used as input packets, the artificial neural network for packet classification and ANF system for the global trust computation. The proposed model was benchmarked with an existing Eigen Trust ET model using detection accuracy and convergence time as performance metrics. The simulation results using the above parameters revealed a better performance of the ANF over ET model. The framework will secure the home network against unforeseen network disruption and node misbehavior.
Computer Science | 2016
Emmanuel Ajayi Olajubu; Ibrahim Kazeem Ogundoyin; Abiodun Akinwale
The study formulated and evaluated a model for effective management of malicious nodes in mobile Ad-hoc network based on Ad-Hoc on- demand distance vector routing protocol. A collaborative injection model called Collaborative Injection Deterrence Model (CIDM) was formulated using stochastic theory. The definition of the model was presented using graph theory. CIDM was simulated using three different scenarios. The three scenarios were then compared using packets delivery ratio (PDR), routing load, throughput and delay as performance metrics. The simulation result showed that CIDM reduce considerably the rate of packets dropped caused by malicious nodes in MANET network. CIDM did not introduce additional load to the network and yet with produce higher throughput. Lastly, the access delay with CIDM is minimal compared with convectional OADV. The study developed a model to mete out a punitive measure to rogue nodes as a form of intrusion deterrence without degrading the overall performance of the network. The well known CRAWDAD dataset was used in the simulation.
International Journal of Advanced Computer Science and Applications | 2015
Akinwale O. Akinwunmi; Emmanuel Ajayi Olajubu; G. Adesola Aderounmu
Cloud computing is a recent model for enabling convenient, on-demand network access to a shared pool of configurable computing resources such as networks, servers, storage, applications, and services; that can be rapidly provisioned and released with minimal management effort or service provider interaction. Studies have shown that cloud computing has the potential to benefit establishments, industries, national and international economies. Despite the enormous benefits cloud computing technology has the potentials of offering, several issues are making intended users to pause in adopting the usage of the technology. Users need to be assured of the safety and reliability of the technology while using it. This is needed to build confidence around the technology and reduce the level of anxiety. This research attempts to investigate the effect of trust in the adoption of the technology by formulating a trust model based on Expectancy Disconfirmation Theory model and Bayesian network. A simulation experiment was carried out to determine the significance of trust in the adoption of cloud technology.
ubiquitous computing | 2014
S. A. Akinboro; Emmanuel Ajayi Olajubu; Ibrahim Kazeem Ogundoyin; Ganiyu A. Aderounmu
This article developed a framework for trust management in mobile ambient home network with a view to secure the home devices and channel against attacks. The framework was design using mobile ad hoc network and social networking concept. The trust management, global reputation aggregation which considered the direct and indirect communication of home devices and remote devices was employed to shield home devices from attacks. While real time dynamic source routing protocol was employed to prevent the channel from attacks by selfish and malicious nodes. The prototype of the framework was implemented using C# programming language. The framework will enhance the activities in the home by securing the home network against unforeseen network disruption and node misbehavior due to the distributed nature of the environment.
computer, information, and systems sciences, and engineering | 2010
Emmanuel Ajayi Olajubu
Mobile agent technology has a lot of gains to offer network-centric applications. The technology promises to be very suitable for narrow-bandwidth networks by reducing network latency and allowing transparent per-to-per computing. Multi-agent technology had been proposed for many network-centric applications with little or no path scheduling algorithms. This paper describes the need for path scheduling algorithms for agents in multi-agent systems. Traveling salesman problem (TSP) scheme is used to model ordered agents and the unordered agents schedule their path based on random distribution. The two types of agents were modeled and simulated based on bandwidth usage and response time as performance metrics. Our simulation results shows that ordered agents have superior performance against unordered agents. The ordered agents exhibit lower bandwidth usage and higher response time.
International Journal on Advances in Ict for Emerging Regions (icter) | 2009
Emmanuel Ajayi Olajubu; Bs Afolabi; Anuoluwapo O. Ajayi
South African Journal of Science | 2010
Emmanuel Ajayi Olajubu; Ganiyu A. Aderounmu; Emmanuel R. Adagunodo
Nigerian Journal of Technology | 2018
Sa Akinboro; Emmanuel Ajayi Olajubu; Ibrahim Kazeem Ogundoyin; Ganiyu A. Aderounmu