Abubakar Umar
Department of Computer Engineering, Faculty of Engineering, Ahmadu Bello University, Zaria, Nigeria

Published : 4 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search

Mathematical Modelling of Truck Platoon Formation Based on a Dynamic String Stability Ore Ofe Ajayi; Abubakar Umar; Ibrahim Ibrahim; Lawal Abdulwahab Olugbenga; Ajikanle Abdulbasit Abiola
Vokasi UNESA Bulletin of Engineering, Technology and Applied Science Vol. 2 No. 2 (2025)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v2i2.34941

Abstract

In this research, developinga Fuzzy Logic Cooperative Adaptive Cruise Control (FCACC) scheme significantly enhanced truck platooning string stability by ensuring rapid stabilization and robustness against disturbances. The mathematical model designed and implemented in SUMO/OMNeT++ simulated various scenarios, demonstrating the superiority of the FCACC over conventional CACC, PATH CACC, and Ploeg CACC controllers. Quantitatively, the FCACC achieved velocity and spacing stability within an average of 7.33 seconds and 4.39 seconds using the triangular-centroid method, outperforming the CACC, PATH CACC, and Ploeg CACC by 28.09%, 25.21%, and 22.26% for velocity stability and 31.69%, 29.96%, and 28.01% for spacing stability, respectively. Additionally, the FCACC reduced the Expected Arrival Time (EAT) deviation by 4.62% compared to the CACC, demonstrating its efficiency in handling disturbances such as truck breakdowns. The FCACC's rapid stabilization, even in the presence of impulse signal disturbances, was evident in its ability to recover within 2.3 seconds for speed and 3.6 seconds for distance, compared to 27.5 seconds and 10.1 seconds for CACC. The fuzzy-PLEXE framework further emphasized the FCACC’s advantage by inducing more minordistance errors and faster stability times than other models, achieving stability in 53 seconds versus 60 seconds for Ploeg CACC. These results underline the FCACC’s efficacy in mitigating unexpected disruptions and maintaining optimal string stability. However, limitations such as dependency on precise sensor data, susceptibility to communication delays, and challenges with scalability for larger platoons were observed, suggesting areas for future optimization.
Early Heart Disease Prediction Using Data Mining Techniques Dugguh Sylvester Aondonenge; Ajayi Ore-Ofe; Kamorudeen Hassan Taiwo; Abubakar Umar; Isa Abdulrazaq Imam; Dako Daniel Emmanuel; Ibrahim Ibrahim
Vokasi UNESA Bulletin of Engineering, Technology and Applied Science Vol. 2 No. 2 (2025)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v2i2.36735

Abstract

Heart disease is a leading cause of mortality worldwide, characterized by the buildup of plaque in the arteries, which can lead to severe cardiovascular complications. Predicting heart disease is complex due to the need to analyze multiple risk factors, such as age, cholesterol, and blood pressure. This study develops a predictive model for earlyheart disease detection using data mining techniques to enhance timely and accurate diagnosis. The model combines multiple machine learning timely and accurate diagnosis. The model combines multiple machine learning algorithms, including Random Forest, Support Vector Machine, and a hybrid ensemble approach to improve prediction accuracy and reliability. The methodology follows five phases: data collection, data pre-processing, feature extraction, model construction, and model evaluation. Data was gathered from publicly available health repositories, preprocessed to remove missing values and irrelevant information, and subjected to feature extraction techniques to identify influential predictors. The hybrid model was trained and tested using an 80:20 data split and evaluated against various classification algorithms. It achieved an accuracy of 97.56%, precision of 98.04%, and recall of 97.09%, outperforming individual models. These results highlight the effectiveness of the hybrid approach in supporting early interventionfor heart disease, particularly in healthcare settings with limited diagnostic resources. This study demonstrates that advanced data mining techniques provide a viable solution for improving patient outcomes through the early detection of heart disease.
Artificial Intelligence -Robotic Process Automation on Enterprise Architecture in the Telecommunications Industry Isa Abdulrazaq Imam; Ajayi Ore-Ofe Ore-Ofe; Abubakar Umar; Dako Daniel Emmanuel; Dugguh Sylvester Aondonenge; Lawal Abdulwahab Olugbenga
Vokasi UNESA Bulletin of Engineering, Technology and Applied Science Vol. 1 No. 3 (2024)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v1i3.36736

Abstract

This paper explores the strategic impact of Artificial Intelligence (AI)-enhanced Robotic Process Automation (RPA) on Enterprise Architecture (EA) within the telecommunications industry. Traditionally, RPA has been applied to automate repetitive tasks without altering underlying IT infrastructure, focusing primarily on operational efficiency. However, the integration of AI introduces cognitive capabilities to RPA, enabling more dynamic interactions within complex organizational systems. This paper assesses how AI-driven RPA can influence EA by enhancing system efficiency, supporting business-IT alignment, and promoting digital transformation. Through case studies and analyses of various telecommunications operations, the paper investigates the dual role of AI-enhanced RPA in both streamlining enterprise-wide processes and maintaining adaptability to meet industry demands. The findings indicate that, while AI-RPA integration holds significant promise for accelerating operational improvements, it also presents unique challenges related to governance, scalability, and long-term sustainability. This work contributes insights into the adoption of AI-driven RPA as a transformative tool for telecommunications, offering guidance on best practices for aligning automated systems with enterprise strategic goals.Additionally, the study provides a structured framework for integrating AI-driven RPA into EA using ArchiMate and TOGAF modeling methodologies, emphasizing its potential to drive scalability, improve governance, and ensure alignment with strategic business objectives
Design of an Enterprise Network Terminal Security Solution Muhammad Idris Abubakar; Ajayi Ore-Ofe; Abubakar Umar; Ibrahim Ibrahim; Lawal Abdulwahab Olugbenga; Ajikanle Abdulbasit Abiola
Vokasi UNESA Bulletin of Engineering, Technology and Applied Science Vol. 2 No. 3 (2025)
Publisher : Universitas Negeri Surabaya or The State University of Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26740/vubeta.v2i3.39105

Abstract

This paper presents a secure enterprise network terminal security solution designed to protect the confidentiality, integrity, and availability of critical data and network resources. It presents a logical approach to creating an enterprise network security architecture with a primary focus on optimizing and enhancing the performance of as data center servers and storage. Traditionally, network infrastructure has primarily focused security measures on core components, such as firewalls and intrusion detection/prevention systems (IDS/IPS). However, the exponential growth of Internet of Things (IoT) devices, Bring Your Device (BYOD) policies, and remote workforce trends has shifted the threat landscape, making network terminals key vectors for malicious access, with critical end devices often being the ultimate targets. This study presents a comprehensive framework that prioritizes terminal-level security by integrating existing encryption techniques, specifically a double layer VPN tunnel architecture, to enhance data transmission confidentiality. A significant contribution of the paper lies in its structured classification of network terminals into thoughtful, intelligent, and dumb categories based on capability and memory—an approach that supports tailored securityimplementations. The framework also outlines contingency measures for securing data center endpoints in the event of a breach scenario. The novelty of this work lies in its focused protection strategy for terminals within enterprise environments, bridging the security gap between endpoints and core infrastructure. The proposed solution demonstrates the potential to reduce exposure to ransomware and targeted attacks through layered defenses and a proactive disaster recovery and business continuity (DR&B) strategy, despite limitations in real-world simulation due to resource constraints.