Olugbenga, Lawal Abdulwahab
Unknown Affiliation

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Development of a Head Gesture-Controlled Robot Using an Accelerometer Sensor Ore-Ofe, Ajayi; Umar, Abubakar; Ibrahim, Ibrahim; Abiola, Ajikanle Abdulbasit; Olugbenga, Lawal Abdulwahab
Vokasi Unesa Bulletin of Engineering, Technology and Applied Science Vol. 1 No. 2 (2024)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v1i2.35114

Abstract

In this research, a head gesture-controlled robot was designed and developed to assist individuals with disabilities in performing tasks by translating head movements into robot commands. Using an accelerometer sensor embedded in a headgear device, the system interprets specific gestures—such as forward nods for forward movement, backward nods for reversing, and lateral tilts for turning left or right—into corresponding robotic actions. The design involved constructing a mechanical framework for the robot, assembling the headgear, and integrating both with Arduino-based programming to ensure accurate and responsive movements. Testing was conducted in a controlled setting, where the robot consistently followed head gestures with a high degree of accuracy, showing rapid response times to user inputs. Quantitative results demonstrated the system’s reliability, with over 95% accuracy in gesture recognition and minimal latency. This innovative system underscores the potential of head gesture-controlled robotics in assistive technology, offering an affordable, user-friendly solution to enhance mobility and autonomy for individuals with limited physical capabilities
Mathematical Modelling of Truck Platoon Formation Based on a Dynamic String Stability Ajayi, Ore-Ofe; Umar, Abubakar; Ibrahim, Ibrahim; Olugbenga, Lawal Abdulwahab; Abiola , Ajikanle Abdulbasit
Vokasi Unesa Bulletin of Engineering, Technology and Applied Science Vol. 2 No. 2 (2025)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v2i2.34941

Abstract

In this research, the development of a fuzzy logic-based cooperative adaptive cruise control scheme for truck platooning string stability was developed. String stability, which is critical to the operation of truck platooning in the area of enhancing traffic flow and reducing fuel consumption can be affected by unknown uncertainties such as truck incapacitation, delay of platoons and inability to maintain a constant inter-vehicular gap. A commonly reported approach in addressing truck platooning string stability is the Cooperative Adaptive Cruise Control (CACC) scheme. The CACC scheme consists of Adaptive Cruise Control (ACC) and vehicle-to-vehicle (V2V) communication. However, the CACC lacks the requisite flexibility in dealing with unexpected disturbances that can result in the inability to maintain a constant speed and inter-vehicular gap.
Design Of an Enterprise Network Terminal Security Solution Idris Abubakar, Muhammad; Ore-Ofe, Ajayi; Umar, Abubakar; Ibrahim, Ibrahim; Olugbenga, Lawal Abdulwahab; Abdulbasit Abiola, Ajikanle
Vokasi Unesa Bulletin of Engineering, Technology and Applied Science Vol. 2 No. 3 (2025)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v2i3.39105

Abstract

This paper develops a secured enterprise network terminal security solution that seeks to safeguard the confidentiality, integrity, and availability of critical data and network resources, the paper presents a logical approach to designing an enterprise network security solution with a primary focus on optimizing and enhancing the performance of the network terminals (and datacenter critical end devices) security solution. The traditional network infrastructure has predominantly centered the security measured on core network components such as Firewalls, Intrusion Detection Systems/Intrusion Prevention Systems (IDS/SPS) but there are encountered security incidences, this is due to the exponential growth of the Internet of Things (IoT) devices, Bring Your Device (BYOD), and remote workforce trends, the network terminals have become the key points through which users access and utilize network resources for malicious attack and in most cases critical end devices such as servers/storage are the end target. This paper presents a comprehensive framework that places considerable emphasis on improving the terminal security performance by utilizing the existing encryption techniques (VPN) to provide double-step tunnels (VPN). However, in the event of an inevitable attack, the paper also presents a framework of how data center core end components, such as server and storage can be protected from the attack. The paper starts by studying the terminal ecosystem, the current terminal security solution, and the latest terminal security solution and designing the solution deemed fit to secure the terminal network.