Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Emmanuel Ajayi Olajubu is active.

Publication


Featured researches published by Emmanuel Ajayi Olajubu.


Archive | 2008

Optimizing Bandwidth Usage and Response Time Using Lightweight Agents on Data Communication Network

Emmanuel Ajayi Olajubu; Ganiyu A. Aderounmu; Emmanuel R. Adagunodo

In this paper we propose light-weight-agent as an efficient and effective tool for implementing data communication network bandwidth optimization and response time. The routing model for the agents is based on TSP algorithms. Performance comparison was carried out among RPC, Single Mobile Agent and tiny agents otherwise referred to as lightweight agents on the basis of bandwidth usage and response time. The performance evaluation shows the superiority of lightweight agents over the other schemes in terms of bandwidth usage and the response time.


Cogent engineering | 2016

A multi-agent system approach for trustworthy cloud service discovery

A.O. Akinwunmi; Emmanuel Ajayi Olajubu; G.A. Aderounmu

Abstract Harnessing the benefits of cloud computing, demands that a potential user has adequate access to trustworthy cloud services. Locating resources and services in a heterogeneous network such as cloud environment may be a tedious task. The cloud computing is a form of distributed system with a complex aggregation of computing resources from different domains with different administrative policies but having immense benefits that could enhance the mode of computing. Discovering cloud services is complicated by the varied level of quality of service offered by the different providers, hence a monolithic approach to cloud service discovery cannot effectively support the cloud environment. This work proposed a distributive approach to discovering trustworthy cloud services with the use of Multi-Agents System for achieving intelligent cloud service discovery. Simulation experiments were carried out and the results showed that extending the Multi-Agents System approach by integrating trust into the process of cloud service discovery improves the quality of service in terms of response time and scalability. A further comparative analysis of Multi-Agents System approach for cloud service discovery to monolithic approach showed that it is highly efficient, and highly flexible for trustworthy cloud service discovery.


ubiquitous computing | 2016

A Trust Model for Detecting Device Attacks in Mobile Ad Hoc Ambient Home Network

Akinboro Solomon; Emmanuel Ajayi Olajubu; Ibrahim Kazeem Ogundoyin; Ganiyu A. Aderounmu

This study designed, simulated and evaluated the performance of a conceptual framework for ambient ad hoc home network. This was with a view to detecting malicious nodes and securing the home devices against attacks. The proposed framework, called mobile ambient social trust consists of mobile devices and mobile ad hoc network as communication channel. The trust model for the device attacks is Adaptive Neuro Fuzzy ANF that considered global reputation of the direct and indirect communication of home devices and remote devices. The model was simulated using Matlab 7.0. In the simulation, NSL-KDD dataset was used as input packets, the artificial neural network for packet classification and ANF system for the global trust computation. The proposed model was benchmarked with an existing Eigen Trust ET model using detection accuracy and convergence time as performance metrics. The simulation results using the above parameters revealed a better performance of the ANF over ET model. The framework will secure the home network against unforeseen network disruption and node misbehavior.


Computer Science | 2016

An Octopus-Inspired Intrusion Deterrence Model in Distributed Computing System

Emmanuel Ajayi Olajubu; Ibrahim Kazeem Ogundoyin; Abiodun Akinwale

The study formulated and evaluated a model for effective management of malicious nodes in mobile Ad-hoc network based on Ad-Hoc on- demand distance vector routing protocol. A collaborative injection model called Collaborative Injection Deterrence Model (CIDM) was formulated using stochastic theory. The definition of the model was presented using graph theory. CIDM was simulated using three different scenarios. The three scenarios were then compared using packets delivery ratio (PDR), routing load, throughput and delay as performance metrics. The simulation result showed that CIDM reduce considerably the rate of packets dropped caused by malicious nodes in MANET network. CIDM did not introduce additional load to the network and yet with produce higher throughput. Lastly, the access delay with CIDM is minimal compared with convectional OADV. The study developed a model to mete out a punitive measure to rogue nodes as a form of intrusion deterrence without degrading the overall performance of the network. The well known CRAWDAD dataset was used in the simulation.


International Journal of Advanced Computer Science and Applications | 2015

Trust: A Requirement for Cloud Technology Adoption

Akinwale O. Akinwunmi; Emmanuel Ajayi Olajubu; G. Adesola Aderounmu

Cloud computing is a recent model for enabling convenient, on-demand network access to a shared pool of configurable computing resources such as networks, servers, storage, applications, and services; that can be rapidly provisioned and released with minimal management effort or service provider interaction. Studies have shown that cloud computing has the potential to benefit establishments, industries, national and international economies. Despite the enormous benefits cloud computing technology has the potentials of offering, several issues are making intended users to pause in adopting the usage of the technology. Users need to be assured of the safety and reliability of the technology while using it. This is needed to build confidence around the technology and reduce the level of anxiety. This research attempts to investigate the effect of trust in the adoption of the technology by formulating a trust model based on Expectancy Disconfirmation Theory model and Bayesian network. A simulation experiment was carried out to determine the significance of trust in the adoption of cloud technology.


ubiquitous computing | 2014

A Prototype for Global Trust Management in Mobile Ambient Home Network

S. A. Akinboro; Emmanuel Ajayi Olajubu; Ibrahim Kazeem Ogundoyin; Ganiyu A. Aderounmu

This article developed a framework for trust management in mobile ambient home network with a view to secure the home devices and channel against attacks. The framework was design using mobile ad hoc network and social networking concept. The trust management, global reputation aggregation which considered the direct and indirect communication of home devices and remote devices was employed to shield home devices from attacks. While real time dynamic source routing protocol was employed to prevent the channel from attacks by selfish and malicious nodes. The prototype of the framework was implemented using C# programming language. The framework will enhance the activities in the home by securing the home network against unforeseen network disruption and node misbehavior due to the distributed nature of the environment.


computer, information, and systems sciences, and engineering | 2010

Economic Path Scheduling for Mobile Agent System on Computer Network

Emmanuel Ajayi Olajubu

Mobile agent technology has a lot of gains to offer network-centric applications. The technology promises to be very suitable for narrow-bandwidth networks by reducing network latency and allowing transparent per-to-per computing. Multi-agent technology had been proposed for many network-centric applications with little or no path scheduling algorithms. This paper describes the need for path scheduling algorithms for agents in multi-agent systems. Traveling salesman problem (TSP) scheme is used to model ordered agents and the unordered agents schedule their path based on random distribution. The two types of agents were modeled and simulated based on bandwidth usage and response time as performance metrics. Our simulation results shows that ordered agents have superior performance against unordered agents. The ordered agents exhibit lower bandwidth usage and higher response time.


International Journal on Advances in Ict for Emerging Regions (icter) | 2009

A Customized e-Shopping System for SMEs in Developing Countries: Cases from the sub Saharan Desert of Africa

Emmanuel Ajayi Olajubu; Bs Afolabi; Anuoluwapo O. Ajayi


South African Journal of Science | 2010

Network resources management in a multi-agent system: a simulative approach

Emmanuel Ajayi Olajubu; Ganiyu A. Aderounmu; Emmanuel R. Adagunodo


Nigerian Journal of Technology | 2018

RTDSR protocol for channel attacks prevention in mobile ad hoc ambient intelligence home networks

Sa Akinboro; Emmanuel Ajayi Olajubu; Ibrahim Kazeem Ogundoyin; Ganiyu A. Aderounmu

Collaboration


Dive into the Emmanuel Ajayi Olajubu's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Abiodun Akinwale

Obafemi Awolowo University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Akinboro Solomon

Bells University of Technology

View shared research outputs
Top Co-Authors

Avatar

Bs Afolabi

Obafemi Awolowo University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

G.A. Aderounmu

Obafemi Awolowo University

View shared research outputs
Researchain Logo
Decentralizing Knowledge