Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12

Search results for: Olubajo Olumide Olu

12 Effect of Rice Husk Ash and Metakaolin on the Compressive Strengths of Ternary Cement Mortars

Authors: Olubajo Olumide Olu


This paper studies the effect of Metakaolin (MK) and Rice husk ash (RHA) on the compressive strength of ternary cement mortar at replacement level up to 30%. The compressive strength test of the blended cement mortars were conducted using Tonic Technic compression and machine. Nineteen ternary cement mortars were prepared comprising of ordinary Portland cement (OPC), Rice husk ash (RHA) and Metakaolin (MK) at different proportion. Ternary mortar prisms in which Portland cement was replaced by up to 30% were tested at various age; 2, 7, 28 and 60 days. Result showed that the compressive strength of the cement mortars increased as the curing days were lengthened for both OPC and the blended cement samples. The ternary cement’s compressive strengths showed significant improvement compared with the control especially beyond 28 days. This can be attributed to the slow pozzolanic reaction resulting from the formation of additional CSH from the interaction of the residual CH content and the silica available in the Metakaolin and Rice husk ash, thus providing significant strength gain at later age. Results indicated that the addition of metakaolin with rice husk ash kept constant was found to lead to an increment in the compressive strength. This can either be attributed to the high silica/alumina contribution to the matrix or the C/S ratio in the cement matrix. Whereas, increment in the rice husk ash content while metakaolin was held constant led to an increment in the compressive strength, which could be attributed to the reactivity of the rice husk ash followed by decrement owing to the presence of unburnt carbon in the RHA matrix. The best compressive strength results were obtained at 10% cement replacement (5% RHA, 5% MK); 15% cement replacement (10% MK and 5% RHA); 20% cement replacement (15% MK and 5% RHA); 25% cement replacement (20% MK and 5% RHA); 30% cement replacement (10%/20% MK and 20%/10% RHA). With the optimal combination of either 15% and 20% MK with 5% RHA giving the best compressive strength of 40.5MPa.

Keywords: metakaolin, rice husk ash, compressive strength, ternary mortar, curing days

Procedia PDF Downloads 202
11 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe

Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran


The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.

Keywords: access control, multimodal biometrics, pattern recognition, security safe

Procedia PDF Downloads 229
10 An ANN-Based Predictive Model for Diagnosis and Forecasting of Hypertension

Authors: Obe Olumide Olayinka, Victor Balanica, Eugen Neagoe


The effects of hypertension are often lethal thus its early detection and prevention is very important for everybody. In this paper, a neural network (NN) model was developed and trained based on a dataset of hypertension causative parameters in order to forecast the likelihood of occurrence of hypertension in patients. Our research goal was to analyze the potential of the presented NN to predict, for a period of time, the risk of hypertension or the risk of developing this disease for patients that are or not currently hypertensive. The results of the analysis for a given patient can support doctors in taking pro-active measures for averting the occurrence of hypertension such as recommendations regarding the patient behavior in order to lower his hypertension risk. Moreover, the paper envisages a set of three example scenarios in order to determine the age when the patient becomes hypertensive, i.e. determine the threshold for hypertensive age, to analyze what happens if the threshold hypertensive age is set to a certain age and the weight of the patient if being varied, and, to set the ideal weight for the patient and analyze what happens with the threshold of hypertensive age.

Keywords: neural network, hypertension, data set, training set, supervised learning

Procedia PDF Downloads 246
9 Comparative Advantage of Mobile Agent Application in Procuring Software Products on the Internet

Authors: Michael K. Adu, Boniface K. Alese, Olumide S. Ogunnusi


This paper brings to fore the inherent advantages in application of mobile agents to procure software products rather than downloading software content on the Internet. It proposes a system whereby the products come on compact disk with mobile agent as deliverable. The client/user purchases a software product, but must connect to the remote server of the software developer before installation. The user provides an activation code that activates mobile agent which is part of the software product on compact disk. The validity of the activation code is checked on connection at the developer’s end to ascertain authenticity and prevent piracy. The system is implemented by downloading two different software products as compare with installing same products on compact disk with mobile agent’s application. Downloading software contents from developer’s database as in the traditional method requires a continuously open connection between the client and the developer’s end, a fixed network is not economically or technically feasible. Mobile agent after being dispatched into the network becomes independent of the creating process and can operate asynchronously and autonomously. It can reconnect later after completing its task and return for result delivery. Response Time and Network Load are very minimal with application of Mobile agent.

Keywords: software products, software developer, internet, activation code, mobile agent

Procedia PDF Downloads 189
8 Radical Islam and Transnational Security: West Africa and the Asia Pacific in View

Authors: Olumide A. Fafore, Khondlo Mtshali


The beginning of the 21st century saw the emergence of new and global threats to national and transnational security in West Africa and the Asia Pacific regions as a result of the spread of jihadist terrorism across borders, a manifestation of the rise of radical Islam. Extremist and armed Islamic movements influenced by Salafism, the Jihad in Afghanistan and the Muslim Brotherhood are prevalent in Northern Nigeria, Niger, Cameroon, Mali, Chad, Pakistan, Afghanistan, and India. Carrying out attacks across borders, including assassinations, murders, armed robberies, and kidnapping, assisted by open and porous borders and large flow of illegal immigrants across borders. This paper examines the effect of Radical Islam on Transnational security through a review of past literature and the social and security consequences on the people of the regions. Our findings indicate that the activities of armed Islamic movements such as Boko Haram, Ansaru and Al-Qaeda are having a negative impact on the economy, development, and security of the states and people of West Africa and the Asia Pacific. It stresses the importance of regional, transnational and international cooperation, as these threats to national and transnational security can no longer be solved in a national or regional framework.

Keywords: Islamic movements, jihadist terrorism, radical Islam, transnational security

Procedia PDF Downloads 51
7 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems

Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu


Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.

Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system

Procedia PDF Downloads 191
6 An Intelligent Scheme Switching for MIMO Systems Using Fuzzy Logic Technique

Authors: Robert O. Abolade, Olumide O. Ajayi, Zacheaus K. Adeyemo, Solomon A. Adeniran


Link adaptation is an important strategy for achieving robust wireless multimedia communications based on quality of service (QoS) demand. Scheme switching in multiple-input multiple-output (MIMO) systems is an aspect of link adaptation, and it involves selecting among different MIMO transmission schemes or modes so as to adapt to the varying radio channel conditions for the purpose of achieving QoS delivery. However, finding the most appropriate switching method in MIMO links is still a challenge as existing methods are either computationally complex or not always accurate. This paper presents an intelligent switching method for the MIMO system consisting of two schemes - transmit diversity (TD) and spatial multiplexing (SM) - using fuzzy logic technique. In this method, two channel quality indicators (CQI) namely average received signal-to-noise ratio (RSNR) and received signal strength indicator (RSSI) are measured and are passed as inputs to the fuzzy logic system which then gives a decision – an inference. The switching decision of the fuzzy logic system is fed back to the transmitter to switch between the TD and SM schemes. Simulation results show that the proposed fuzzy logic – based switching technique outperforms conventional static switching technique in terms of bit error rate and spectral efficiency.

Keywords: channel quality indicator, fuzzy logic, link adaptation, MIMO, spatial multiplexing, transmit diversity

Procedia PDF Downloads 55
5 Intelligent Parking Systems for Quasi-Close Communities

Authors: Ayodele Adekunle Faiyetole, Olumide Olawale Jegede


This paper presents the experimental design and needs justifications for a localized intelligent parking system (L-IPS), ideal for quasi-close communities with increasing vehicular volume that depends on limited or constant parking facilities. For a constant supply in parking facilities, the demand for an increasing vehicular volume could lead to poor time conservation or extended travel time, traffic congestion or impeded mobility, and safety issues. Increased negative environmental and economic externalities are other associated and consequent downsides of disparities in demand and supply. This L-IPS is designed using a microcontroller, ultrasonic sensors, LED indicators, such that the current status, in terms of parking spots availability, can be known from the main entrance to the community or a parking zone on a LCD screen. As an advanced traffic management system (ATMS), the L-IPS is designed to resolve aspects of infrastructure-to-driver (I2D) communication and parking detection issues. Thus, this L-IPS can act as a timesaver for users by helping them know the availability of parking spots. Providing on-time, informed routing, to a next preference or seamless moving to berth on the available spot on a proximate facility as the case may be. Its use could also increase safety and increase mobility, and fuel savings and costs, therefore, reducing negative environmental and economic externalities due to transportation systems.

Keywords: intelligent parking systems, localized intelligent parking system, intelligent transport systems, advanced traffic management systems, infrastructure-to-drivers communication

Procedia PDF Downloads 58
4 Geothermal Energy Potential Estimates of Niger Delta Basin from Recent Studies

Authors: Olumide J. Adedapo


In this work, geothermal energy resource maps of the Niger Delta Basin were constructed using borehole thermal log data from over 300 deep wells. Three major geothermal anomalies were delineated and quantitatively interpreted in both onshore and offshore parts of the Niger Delta. The geothermal maps present the distribution of geothermal energy stored in the sedimentary rock mass in two ways: the accessible resources in depth interval 0-4000 m and static geothermal energy resources stored in the complete sedimentary infill of the basin (from the ground surface to the basement). The first map shows two major onshore anomalies, one in the north (with maximum energy values, 800 GJ/m2), another in the east to northeastern part (maximum energy values of 1250–1500 GJ/m2). Another two major anomalies occur offshore, one in the south with values of 750-1000 GJ/m2, occurring at about 100 km seawards and the other, in the southwest offshore with values 750-1250 GJ/m2, still at about 100 km from the shore. A second map of the Niger Delta shows a small anomaly in the northern part with the maximum value of 1500 GJ/m2 and a major anomaly occurring in the eastern part of the basin, onshore, with values of 2000-3500 GJ/m2. Offshore in the south and southwest anomalies in the total sedimentary rock mass occur with highest values up to 4000GJ/m2, with the southwestern anomaly extending west to the shore. It is much of interest to note the seaward–westward extension of these anomalies both in size, configuration, and magnitude for the geothermal energy in the total sedimentary thickness to the underlying basement. These anomalous fields show the most favourable locations and areas for further work on geothermal energy resources.

Keywords: geothermal energy, offshore, Niger delta, basin

Procedia PDF Downloads 137
3 Investigation of Geothermal Gradient of the Niger Delta from Recent Studies

Authors: Adedapo Jepson Olumide, Kurowska Ewa, K. Schoeneich, Ikpokonte A. Enoch


In this paper, subsurface temperature measured from continuous temperature logs were used to determine the geothermal gradient of NigerDelta sedimentary basin. The measured temperatures were corrected to the true subsurface temperatures by applying the American Association of Petroleum Resources (AAPG) correction factor, borehole temperature correction factor with La Max’s correction factor and Zeta Utilities borehole correction factor. Geothermal gradient in this basin ranges from 1.20C to 7.560C/100m. Six geothermal anomalies centres were observed at depth in the southern parts of the Abakaliki anticlinorium around Onitsha, Ihiala, Umuaha area and named A1 to A6 while two more centre appeared at depth of 3500m and 4000m named A7 and A8 respectively. Anomaly A1 describes the southern end of the Abakaliki anticlinorium and extends southwards, anomaly A2 to A5 were found associated with a NW-SE structural alignment of the Calabar hinge line with structures describing the edge of the Niger Delta basin with the basement block of the Oban massif. Anomaly A6 locates in the south-eastern part of the basin offshore while A7 and A8 are located in the south western part of the basin offshore. At the average exploratory depth of 3500m, the geothermal gradient values for these anomalies A1, A2, A3, A4, A5, A6, A7, and A8 are 6.50C/100m, 1.750C/100m, 7.50C/100m, 1.250C/100m, 6.50C/100m, 5.50C/100m, 60C/100m, and 2.250C/100m respectively. Anomaly A8 area may yield higher thermal value at greater depth than 3500m. These results show that anomalies areas of A1, A3, A5, A6 and A7 are potentially prospective and explorable for geothermal energy using abandoned oil wells in the study area. Anomalies A1, A3.A5, A6 occur at areas where drilled boreholes were not exploitable for oil and gas but for the remaining areas where wells are so exploitable there appears no geothermal anomaly. Geothermal energy is environmentally friendly, clean and reversible.

Keywords: temperature logs, geothermal gradient anomalies, alternative energy, Niger delta basin

Procedia PDF Downloads 164
2 Personalization of Context Information Retrieval Model via User Search Behaviours for Ranking Document Relevance

Authors: Kehinde Agbele, Longe Olumide, Daniel Ekong, Dele Seluwa, Akintoye Onamade


One major problem of most existing information retrieval systems (IRS) is that they provide even access and retrieval results to individual users specially based on the query terms user issued to the system. When using IRS, users often present search queries made of ad-hoc keywords. It is then up to IRS to obtain a precise representation of user’s information need, and the context of the information. In effect, the volume and range of the Internet documents is growing exponentially and consequently causes difficulties for a user to obtain information that precisely matches the user interest. Diverse combination techniques are used to achieve the specific goal. This is due, firstly, to the fact that users often do not present queries to IRS that optimally represent the information they want, and secondly, the measure of a document's relevance is highly subjective between diverse users. In this paper, we address the problem by investigating the optimization of IRS to individual information needs in order of relevance. The paper addressed the development of algorithms that optimize the ranking of documents retrieved from IRS. This paper addresses this problem with a two-fold approach in order to retrieve domain-specific documents. Firstly, the design of context of information. The context of a query determines retrieved information relevance using personalization and context-awareness. Thus, executing the same query in diverse contexts often leads to diverse result rankings based on the user preferences. Secondly, the relevant context aspects should be incorporated in a way that supports the knowledge domain representing users’ interests. In this paper, the use of evolutionary algorithms is incorporated to improve the effectiveness of IRS. A context-based information retrieval system that learns individual needs from user-provided relevance feedback is developed whose retrieval effectiveness is evaluated using precision and recall metrics. The results demonstrate how to use attributes from user interaction behavior to improve the IR effectiveness.

Keywords: context, document relevance, information retrieval, personalization, user search behaviors

Procedia PDF Downloads 375
1 Growth Performance and Intestinal Morphology of Isa Brown Pullet Chicks Fed Diets Containing Turmeric and Clove

Authors: Ayoola Doris Ayodele, Grace Oluwatoyin Tayo, Martha Dupe Olumide, Opeyemi Arinola Ajayi, Ayodeji Taofeek Ayo-Bello


Antibiotics have been widely used in animal nutrition to improve growth performance and health worldwide for many decades. However, there are rising concerns on the negative impact of dependence on antibiotic growth promoters (AGP) to improve animal performance despite its tremendous use. The need to improve performance in poultry production creates demand for natural alternative sources. Phytogenic feed additives (PFA) are plant-derived natural bioactive compounds that could be incorporated into animal feed to enhance livestock productivity. The effect of Turmeric, clove and turmeric + clove as feed additive was evaluated on performance and intestinal morphology of egg type chickens. 504- fifteen day old Isa brown chicks were weighed and randomly distributed to nine dietary treatments by a 3 x 3 factorial arrangement (test ingredient x inclusion level) in a completely randomized design, with four replicates of 14 birds each. The birds were fed Chick starter diet containing (2800 kcal/kg ME; 20.8% CP). Dietary treatments were Group 1 (T1- basal diet with 0% Turmeric inclusion), (T2- basal diet with 1% Turmeric inclusion), (T3- basal diet with 2% Turmeric inclusion). Group 2 (T4- basal diet with 0% clove inclusion), (T5- basal diet with 1% clove inclusion), (T6- basal diet with 2% clove inclusion). Group 3, turmeric + clove combination on 1:1 ratio weight for weight (T7- basal diet with 0% turmeric + 0% clove inclusion), (T8- basal diet with 0.5% turmeric + 0.5 clove% inclusion), (T9- basal diet with 1% turmeric + 1% clove inclusion). Performance parameters were evaluated throughout the experiment. The experiment spanned from day 15 to 56. Data were analyzed using Analysis of Variance (ANOVA) followed by Duncan’s Multiple Range Test with significance of P≤ 0.05. Significant differences (P>0.05) were not observed in final body weight, weight gain, feed intake and FCR among birds fed with diets containing across the treatments. However, birds fed with test ingredients showed higher numerical values in final body weight and weight gain when compared to the birds without additive. Birds on T8 had the highest final body weight value of 617.33 g and low values in all the control treatments (T1 -588 g, T4- 572 g and T7 -584 g). At day 56, intestinal samples were taken from the jejunum and ileum to evaluate the villus height, crypt depth and villus: crypt depth ratio. Addition of turmeric, clove and turmeric + clove in the diet produced significant (P< 0.05) effect on Jejunum and ileum of birds. Therefore, Turmeric and clove can be used as feed additives for pullet birds because they have a positive effect on growth performance and intestinal morphology of pullet chicks.

Keywords: clove, intestinal morphology, isa brown chicks, performance, turmeric

Procedia PDF Downloads 41