Papers by Lawrence Kehinde
2016 ASEE Annual Conference & Exposition Proceedings
Int'l J. of Communications, Network and System Sciences, 2013
IEEE International Conference on Electro-Information Technology , EIT 2013, 2013
ABSTRACT Mobile applications are being implemented in varieties of areas including mobile commerc... more ABSTRACT Mobile applications are being implemented in varieties of areas including mobile commerce, purchase of services and products using mobile devices, gaming, banking, information services etc. Obafemi Awolowo University is a large academic community that can benefit from a mobile information service centre. There is a large population of students who can satisfy a great deal of their information needs. Existing modes of information delivery are inefficient and in most cases not timely. There is therefore a need for the provisioning of a suitable software application framework that can meet this critical need. This paper presents a suitable software system that can deliver information services with mobile functionality to the content subscriber (students in this case). Mobile devices are prevalent amongst students and teachers, which provides the motivation for the application of mobile technologies in learning environment. The mobility provided was achieved using SMS over GSM Network with the hardware implemented on a GSM Nokia phone acting as a modem. Object-Oriented Analysis and Design (OOAD) approach with the Unified Modelling Language (UML) was employed to document the software component of the application. This system was then implemented in Java programming language. The software developed include; integrated subscription, payment and billing, user profile management, efficient mobile architecture, and ease of content publishing, all loosely coupled, to allow for further extension to the service architecture.
Wireless networks are prone to security attacks due mainly to the open nature of its transmission... more Wireless networks are prone to security attacks due mainly to the open nature of its transmission medium (open air). Hence wireless network security is more concentrated and complex than that of a wired network. With the advent of wireless network technologies in the market today, mobility has becomes an important requirement for most university networks. A lot of attention has been given to the provision of wireless infrastructures in the University networks, but little attention has been given to wireless network security in a University environment. The current wireless network security implemented in Universities are weak, making it possible for hacker to break into University networks and hack confidential information of students, staffs and faculty members. This paper addresses how to enhance wireless network security by proposing a pee-to-peer security model with MAC address control, using Extensible Authentication Protocol with Tunneled Transport Layer Security (EAP- TTLS) w...
… (EIT), 2011 IEEE …, 2011
... The techniques A Distributed Intrusion Detection Scheme for Wireless Sensor Networks SI Eludi... more ... The techniques A Distributed Intrusion Detection Scheme for Wireless Sensor Networks SI Eludiora, OO Abiona*, AO Oluwatope, SA Bello, ML Sanni, , DO Ayanda, CE Onime ER Adagunodo and LO Kehinde T Page 2. ... [11] Sophia Kaplantzis, Alistair Shilton, Nallasamy Mani ...
2009 IEEE International Conference on Electro/Information Technology, 2009
Wireless networks are prone to security attacks due mainly to the open nature of its transmission... more Wireless networks are prone to security attacks due mainly to the open nature of its transmission medium (open air). Hence wireless network security is more concentrated and complex than that of a wired network. With the advent of wireless network technologies in the market today, mobility has becomes an important requirement for most university networks. A lot of attention has been given to the provision of wireless infrastructures in the University networks, but little attention has been given to wireless network security in a University environment. The current wireless network security implemented in Universities are weak, making it possible for hacker to break into University networks and hack confidential information of students, staffs and faculty members. This paper addresses how to enhance wireless network security by proposing a pee-to-peer security model with MAC address control, using Extensible Authentication Protocol with Tunneled Transport Layer Security (EAP-TTLS) wi...
With the rapid development of computer and Internet technologies, the virtual and remote laborato... more With the rapid development of computer and Internet technologies, the virtual and remote laboratories have become an important part of the educational process. To develop interactive virtual and remote laboratories (VR-Lab) for Engineering and Technology education, several tools are available. The most popular are LabVIEW, Java applet and Flash. In this paper, case studies are presented for the development of VR-Lab with LabVIEW, Java applet and Flash. The client software requirements comparison is drawn from virtual and remote laboratories development practices.
2009 Annual Conference & Exposition Proceedings
ABSTRACT With the rapid development of computer and Internet technologies, the virtual and remote... more ABSTRACT With the rapid development of computer and Internet technologies, the virtual and remote laboratories have become an important part of the educational process. To develop interactive virtual and remote laboratories (VR-Lab) for Engineering and Technology education, several tools are available. The most popular are LabVIEW, Java applet and Flash. In this paper, case studies are presented for the development of VR-Lab with LabVIEW, Java applet and Flash. The client software requirements comparison is drawn from virtual and remote laboratories development practices.
International journal of engineering research and technology, 2015
—This study developed a low cost, battery powered, low energy, and remotely monitored bird egg ha... more —This study developed a low cost, battery powered, low energy, and remotely monitored bird egg hatching system (incubator). The system developed has two parts, the mechanical and electronic part. The mechanical part is a mechanism for angular tilting of egg trays up and down on an hourly basis while the electronic part provides for the electronic measurement and control of the incubator's incubation parameters (temperature, humidity, ventilation and egg tilting). The various control elements in the incubator chamber are the DC motor, humidifier, ventilation fans, and a specially made low power DC heater used to regulate egg tilting, humidity, ventilation and temperature, respectively. The incubator system developed was tested with quail eggs for 17 days. It was able to maintain the temperature between the required range of 37 0 C and 38 0 C. Humidity was maintained between 32% and 35% during incubation and 60% and 75% during hatching. The incubator achieved 94% hatchability.
This work uses inertial sensors (accelerometer and gyroscope) to track human knee joint movement ... more This work uses inertial sensors (accelerometer and gyroscope) to track human knee joint movement and then compares results from these sensors. The MPU-9150 module which combines a tri-axial accelerometer and a tri-axial gyroscope was used as sensors. An mbed NXP LPC1768 was used as microcontroller and ZigBee protocol (XBee Modules) was employed for wireless communication. Both sensors show high repeatability (< 1.0 ° ), indicating usability. While the gyroscope is good for range of motion measurement, an accelerometer is good for tilt angle measurement. Though data fusion techniques can be used to integrate data from both sensors, it results in an increase in development cost.
2010 Annual Conference & Exposition Proceedings
International journal of engineering research and technology, 2015
-In ensuring that the quality of stored maize grains is protected against mold infection, heat bu... more -In ensuring that the quality of stored maize grains is protected against mold infection, heat buildup, odour development and microorganisms which are the causative agents of spoilage, the moisture content (MC) of the grains need to be well monitored and controlled. Meanwhile, moisture content is directly dependent on some basic environmental factors which in-turn affects the quality and economic value of the grains. This paper presents a wireless sensor network (WSN) solution to the problem of correctly determining and controlling the effect of MC on stored bulk maize grains. The study hereby presented, characterizes a sensor node and develops a measuring system consisting of network of calibrated sensor nodes and a coordinator. Data values for the moisture content of the grains were collected from the nodes at different locations of the storage bin and wirelessly communicated to the central hub consisting of the coordinator and personal computer (PC). LabVIEW programming software was used to develop a graphical user interface (GUI) for collection, logging and analysis of the data. The system indicated an alert whenever the MC of grains at any of the nodes exceeded the set limits for good maize storage condition. This helped the administrator to initiate aeration for mitigating the effects of high MC. This study concludes that the reported approach is more suitable for studying the relationship between moisture content, relative humidity and temperature, and provides improved flexibility and reliability in measurement and control of moisture content of grains. Keywords--Maize grains, Wireless Sensor Network, Moisture content, LabVIEW.
An industrial revolution named “Internet of Things” has already started with the number of device... more An industrial revolution named “Internet of Things” has already started with the number of devices connected to the Internet outnumbering the number of humans. A number of application domains (like smart healthcare, smart home, smart agriculture, smart transportation, etc.) are being researched with new domains springing up. However, a number of wireless connectivity protocols (including Bluetooth, Bluetooth low energy, ZigBee, Z-wave, Wi-Fi, 6LowPAN, GSM, UWB, etc.) can be used in IoT applications. There is therefore the challenge of how to select the most efficient wireless connectivity standard based on data rate, network range, type of devices, environment, distance, energy consumption, etc. Hence, this work tests and compares three commonly used wireless connectivity modules, namely, Bluetooth, ZigBee and Wi-Fi based on power consumption, range, topology and cost in order to provide IoT application developers with communication interface paradigm for sensors and actuators in th...
This paper presents a basic laboratory training module aimed at helping undergraduate students un... more This paper presents a basic laboratory training module aimed at helping undergraduate students understand the interfacing and connectivity issues involved in the Internet of things (IoT). The training module uses a sequential teaching approach to draft quasi-experiments for teaching basic IoT concepts. Interfacing includes identification, embedded sensing and embedded actuating while connectivity includes wireless connectivity and web/ mobile services. An IoT function (control and/or measurement) is first selected by users based on the physical variable of interest and the action to be carried out. The user will also select a connectivity option based on network types and transmission technologies available for communication between a sensor and/or an actuator and a gateway. The available connectivity options in this work are Bluetooth and RF. An interface is then setup based on the choices made using Arduino Pro Mini as microcontroller. Arduino Yun and a smartphone are the availabl...
High power consumption of Internet of Things (IoT) nodes and the cost of implementing existing Io... more High power consumption of Internet of Things (IoT) nodes and the cost of implementing existing IoT architectures usually hamper the successful deployment of IoT solutions. Also, at locations with problematic or weak Internet presence where it takes longer time to transmit node data to the Internet, the resulting increase in power consumption hinders the development and deployment of IoT solutions. This paper therefore presents an IoT architecture that enables the development of low cost and energy efficient IoT solutions across various application domains even at the face of weak Internet signal. Existing IoT hardware platforms were first compared on the basis of on-board connectivity and microcontroller types and cost in order to select an appropriate hardware platform for the architecture. In addition, a suitable application layer protocol for end-to-end wireless communications was selected. These led to the respective selection and adaptation of ESP8266 module which integrates bo...
Realistic interfaces for iLab-based operational amplifier experiments have previously been report... more Realistic interfaces for iLab-based operational amplifier experiments have previously been reported. Motivated by experiences and students' feedback gathered in the past, an even more realistic interface for op-amp experimentation using iLab technology is hereby presented. The emphasis in the current work was on the design of a new client and consequently, the system under test (SUT) remains largely unchanged from previously-reported iterations of the lab. The only notable exception is that in the current SUT, the operational amplifier circuit also allows the construction of a difference amplifier. As before, remote configurability and data acquisition are achieved through a 100-channel switch array and a NI USB-6251 DAQ card controlled by the experiment engine respectively. The realistic-looking interface of the circuit is implemented using Adobe Flex technology. It utilizes a metaphor fabricated around realistic images of the breadboards, electronic components and instruments....
Computers in Biology and Medicine
2012 ASEE Annual Conference & Exposition Proceedings
Uploads
Papers by Lawrence Kehinde