Ajikanle Abdulbasit Abiola
Department of Computer Engineering, Faculty of Engineering, Ahmadu Bello University, Zaria, Nigeria

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Mathematical Modelling of Truck Platoon Formation Based on a Dynamic String Stability Ore Ofe Ajayi; Abubakar Umar; Ibrahim Ibrahim; Lawal Abdulwahab Olugbenga; Ajikanle Abdulbasit Abiola
Vokasi UNESA Bulletin of Engineering, Technology and Applied Science Vol. 2 No. 2 (2025)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v2i2.34941

Abstract

In this research, developinga Fuzzy Logic Cooperative Adaptive Cruise Control (FCACC) scheme significantly enhanced truck platooning string stability by ensuring rapid stabilization and robustness against disturbances. The mathematical model designed and implemented in SUMO/OMNeT++ simulated various scenarios, demonstrating the superiority of the FCACC over conventional CACC, PATH CACC, and Ploeg CACC controllers. Quantitatively, the FCACC achieved velocity and spacing stability within an average of 7.33 seconds and 4.39 seconds using the triangular-centroid method, outperforming the CACC, PATH CACC, and Ploeg CACC by 28.09%, 25.21%, and 22.26% for velocity stability and 31.69%, 29.96%, and 28.01% for spacing stability, respectively. Additionally, the FCACC reduced the Expected Arrival Time (EAT) deviation by 4.62% compared to the CACC, demonstrating its efficiency in handling disturbances such as truck breakdowns. The FCACC's rapid stabilization, even in the presence of impulse signal disturbances, was evident in its ability to recover within 2.3 seconds for speed and 3.6 seconds for distance, compared to 27.5 seconds and 10.1 seconds for CACC. The fuzzy-PLEXE framework further emphasized the FCACC’s advantage by inducing more minordistance errors and faster stability times than other models, achieving stability in 53 seconds versus 60 seconds for Ploeg CACC. These results underline the FCACC’s efficacy in mitigating unexpected disruptions and maintaining optimal string stability. However, limitations such as dependency on precise sensor data, susceptibility to communication delays, and challenges with scalability for larger platoons were observed, suggesting areas for future optimization.
Design of an Enterprise Network Terminal Security Solution Muhammad Idris Abubakar; Ajayi Ore-Ofe; Abubakar Umar; Ibrahim Ibrahim; Lawal Abdulwahab Olugbenga; Ajikanle Abdulbasit Abiola
Vokasi UNESA Bulletin of Engineering, Technology and Applied Science Vol. 2 No. 3 (2025)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v2i3.39105

Abstract

This paper presents a secure enterprise network terminal security solution designed to protect the confidentiality, integrity, and availability of critical data and network resources. It presents a logical approach to creating an enterprise network security architecture with a primary focus on optimizing and enhancing the performance of as data center servers and storage. Traditionally, network infrastructure has primarily focused security measures on core components, such as firewalls and intrusion detection/prevention systems (IDS/IPS). However, the exponential growth of Internet of Things (IoT) devices, Bring Your Device (BYOD) policies, and remote workforce trends has shifted the threat landscape, making network terminals key vectors for malicious access, with critical end devices often being the ultimate targets. This study presents a comprehensive framework that prioritizes terminal-level security by integrating existing encryption techniques, specifically a double layer VPN tunnel architecture, to enhance data transmission confidentiality. A significant contribution of the paper lies in its structured classification of network terminals into thoughtful, intelligent, and dumb categories based on capability and memory—an approach that supports tailored securityimplementations. The framework also outlines contingency measures for securing data center endpoints in the event of a breach scenario. The novelty of this work lies in its focused protection strategy for terminals within enterprise environments, bridging the security gap between endpoints and core infrastructure. The proposed solution demonstrates the potential to reduce exposure to ransomware and targeted attacks through layered defenses and a proactive disaster recovery and business continuity (DR&B) strategy, despite limitations in real-world simulation due to resource constraints.