Papers by Abayomi Otebolaku

Smart devices, such as smartphones, smartwatches, etc., are examples of promising platforms for a... more Smart devices, such as smartphones, smartwatches, etc., are examples of promising platforms for automatic recognition of human activities. However, it is difficult to accurately monitor complex human activities on these platforms due to interclass pattern similarities, which occur when different human activities exhibit similar signal patterns or characteristics. Current smartphone-based recognition systems depend on traditional sensors, such as accelerometers and gyroscopes, which are built-in in these devices. Therefore, apart from using information from the traditional sensors, these systems lack the contextual information to support automatic activity recognition. In this article, we explore environmental contexts, such as illumination (light conditions) and noise level, to support sensory data obtained from the traditional sensors using a hybrid of Convolutional Neural Network and Long Short-Term Memory (CNN-LSTM) learning models. The models performed sensor fusion by augmenting low-level sensor signals with rich contextual data to improve the models' recognition accuracy and generalization. Two sets of experiments were performed to validate the proposed solution. The first set of experiments used triaxial inertial sensing signals to train baseline models, while the second set of experiments combined the inertial signals with contextual information from environmental sensors. The obtained results demonstrate that contextual information, such as environmental noise level and light conditions using hybrid deep learning models, achieved better recognition accuracy than the traditional baseline activity recognition models without contextual information.

Demand side management is a critical issue in the energy sector. Recent events such as the global... more Demand side management is a critical issue in the energy sector. Recent events such as the global energy crisis, costs, the necessity to reduce greenhouse emissions, and extreme weather conditions have increased the need for energy efficiency. Thus, accurately predicting energy consumption is one of the key steps in addressing inefficiency in energy consumption and its optimization. In this regard, accurate predictions on a daily, hourly, and minute-by-minute basis would not only minimize wastage but would also help to save costs. In this article, we propose intelligent models using ensembles of convolutional neural network (CNN), long-short-term memory (LSTM), bi-directional LSTM and gated recurrent units (GRUs) neural network models for daily, hourly, and minute-byminute predictions of energy consumptions in smart buildings. The proposed models outperform state-of-the-art deep neural network models for predicting minute-by-minute energy consumption, with a mean square error of 0.109. The evaluated hybrid models also capture more latent trends in the data than traditional single models. The results highlight the potential of using hybrid deep learning models for improved energy efficiency management in smart buildings.

With the widespread of embedded sensing capabilities of mobile devices, there has been unpreceden... more With the widespread of embedded sensing capabilities of mobile devices, there has been unprecedented development of context-aware solutions. This allows the proliferation of various intelligent applications such as those for remote health and lifestyle monitoring, intelligent personalized services, etc. However, activity context recognition based on multivariate time series signals obtained from mobile devices in unconstrained conditions is naturally prone to imbalance class problems. This means that recognition models tend to predict classes with the majority number of samples whilst ignoring classes with the least number of samples, resulting in poor generalization. To address this problem, we propose to augment the time series signals from inertia sensors with signals from ambient sensing to train deep convolutional neural networks (DCNN) models. DCNN provides the characteristics that capture local dependency and scale invariance of these combined sensor signals. Consequently, we developed a DCNN model using only inertial sensor signals and then developed another model that combined signals from both inertia and ambient sensors aiming to investigate the class imbalance problem by improving the performance of the recognition model. Evaluation and analysis of the proposed system using data with imbalanced classes show that the system achieved better recognition accuracy when data from inertial sensors are combined with those from ambient sensors such as environment noise level and illumination, with an overall improvement of 5.3% accuracy.

arXiv (Cornell University), Jul 31, 2020
palm vein identification (PVI) is a modern biometric security technique used for increasing secur... more palm vein identification (PVI) is a modern biometric security technique used for increasing security and authentication systems. The key characteristics of palm vein patterns include, its uniqueness to each individual, unforgettable, non-intrusive and cannot be taken by an unauthorized person. However, the extracted features from the palm vein pattern are huge with high redundancy. In this paper, we propose a combine model of two-Dimensional Discrete Wavelet Transform, Principal Component Analysis (PCA), and Particle Swarm Optimization (PSO) (2D-DWTPP) to enhance prediction of vein palm patterns. The 2D-DWT Extracts features from palm vein images, PCA reduces the redundancy in palm vein features. The system has been trained in selecting high reverent features based on the wrapper model. The PSO feeds wrapper model by an optimal subset of features. The proposed system uses four classifiers as an objective function to determine VPI which include Support Vector Machine (SVM), K Nearest Neighbor (KNN), Decision Tree (DT) and Naïve Bayes (NB). The empirical result shows the proposed system Iit satisfied best results with SVM. The proposed 2D-DWTPP model has been evaluated and the results shown remarkable efficiency in comparison with Alexnet and classifier without feature selection. Experimentally, our model has better accuracy reflected by (98.65) while Alexnet has (63.5) and applied classifier without feature selection has (78.79).

The World Health Organization(WHO) in 2016 considered mHealth as: "the use of mobile wireless tec... more The World Health Organization(WHO) in 2016 considered mHealth as: "the use of mobile wireless technologies including smart devices such as smartphones and smartwatches for public health" as an important resource for health services delivery and public health given their ease of use, broad reach and acceptance. WHO emphasizes the potential of this technology to increase access to health information, services and skills as well as promoting positive changes in health behaviors and management of diseases. In this regard, the capability of smartphones and smartwatches for m-health monitoring as well as verification of the patient the signal has become an important component of mHealth system. Most of the smartwatches could extract more than one bioelectrical signal therefore, therefore they provide suitable platform for extracting health data for e-monitoring. The existing approaches have not considered the integrity of data obtained from these smart devices. Therefore, it is important that the integrity of the collected data be verified continuously through user authentication. This could be done using any of the bioelectrical signals extracted and transmitted for e-monitoring. In this article, a smartwatch is used for extracting bioelectrical signal before decomposing the signal into sub-bands of Detail and Approximation Coefficient for user authentication. To select suitable features using biorthogonal wavelet decomposition of signal from a non-intrusive extraction, a detailed experiment is conducted extracting suitable statistical features from the bioelectrical signal from 30 subjects using different biorthogonal wavelet family. Ten features are extracted using Biorthogonal wavelet to decompose the signal into three levels of sub-band Detail and Approximation Coefficient and features extracted from each level the decomposed Detail and Approximation Coefficients. Comparison analysis is done after the classification of the extracted features based on the Equal Error Rate (EER). Using Neural Network (NN) classifier, Biorthogonal Wavelet Detail Coefficient Sub-band level 3 of bior1.1 achieved the best result of EER 13.80% with the fusion of the best sub-band three levels of bior1.1 achieving a better result of 12.42% EER.

Application of trust principals in internet of things (IoT) has allowed to provide more trustwort... more Application of trust principals in internet of things (IoT) has allowed to provide more trustworthy services among the corresponding stakeholders. The most common method of assessing trust in IoT applications is to estimate trust level of the end entities (entity-centric) relative to the trustor. In these systems, trust level of the data is assumed to be the same as the trust level of the data source. However, most of the IoT based systems are data centric and operate in dynamic environments, which need immediate actions without waiting for a trust report from end entities. We address this challenge by extending our previous proposals on trust establishment for entities based on their reputation, experience and knowledge, to trust estimation of data items [1-3]. First, we present a hybrid trust framework for evaluating both data trust and entity trust, which will be enhanced as a standardization for future data driven society. The modules including data trust metric extraction, data...

Smart devices such as smartphones, smartwatches, etc. are promising platforms that are being used... more Smart devices such as smartphones, smartwatches, etc. are promising platforms that are being used for automatic recognition of human activities. However, it is difficult to accurately monitor complex human activities due to inter-class pattern similarity, which occurs when different human activities exhibit similar signal patterns or characteristics. Current smartphone-based recognition systems depend on the traditional sensors such as accelerometer and gyroscope, which are inbuilt in these devices. Therefore, apart from using information from the traditional sensors, these systems lack contextual information to support automatic activity recognition. In this article, we explore environment contexts such as illumination(light conditions) and noise level to support sensory data obtained from the traditional sensors using a hybrid of Convolutional Neural Networks and Long Short Time Memory(CNN_LSTM) learning models. The models performed sensor fusion by augmenting the low-level sensor...

Encyclopedia of Information Science and Technology, Fourth Edition, 2018
Audiovisual content consumption on mobile platforms is rising exponentially and this trend will c... more Audiovisual content consumption on mobile platforms is rising exponentially and this trend will continue in the next years as mobile devices become more sophisticated. Thus, smartphones are gradually replacing our desktops as they increasingly become cheaper and more powerful with excellent multimedia processing support. As mobile users go about their routines, they continuously browse the Web, seeking interesting content to consume, and also uploading personal content. However, users encounter huge volume of content, that does not match their preferences, resulting in mobile information overload. Context-aware media personalization (CAMP) was proposed as a solution to this problem. CAMP assists users to select relevant content among alternatives considering users' preferences and contexts. This solution, however, are limited to static contexts. Our contribution is Mobile Context-Aware Media Personalization(MobCAMP), which is a special kind of personalization that utilizes user&...

Network slicing is a promising technology for 5G networks in which operators can sell customized ... more Network slicing is a promising technology for 5G networks in which operators can sell customized services to different tenants at various prices and Quality of Services (QoS) demands. Thus, the latest 4th Generation (4G) and upcoming 5th Generation (5G) mobile technologies are expected to offer massive connectivity and management of high volume of data traffic in the presence of immense interferences from mobile networks of IoT devices. Further, it will face challenges of congestion and overload of data traffic due to the humongous number of IoT devices. Nevertheless, these devices are likely to demand high throughput, low latency, and high level of reliability especially for critical real-time applications such as in Vehicular Communication System (VCS). To address these issues in 5G mobile networks, this paper proposes a Slice Allocation Management (SAM) Model based on the critical services of smart systems such as VCS to satisfy QoS demands. The proposed model aims at providing d...

2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA), May 1, 2018
Network slicing is an architectural solution that enables the future 5G network to offer a high d... more Network slicing is an architectural solution that enables the future 5G network to offer a high data traffic capacity and efficient network connectivity. Moreover, software defined network (SDN) and network functions virtualization (NFV) empower this architecture to visualize the physical network resources. The network slicing identified as a multiple logical network, where each network slice dedicates as an end-to-end network and works independently with other slices on a common physical network resources. Most user devices have more than one smart wireless interfaces to connect to different radio access technologies (RATs) such as WiFi and LTE, thereby network operators utilize this facility to offload mobile data traffic. Therefore, it is important to enable a network slicing to manage different RATs on the same logical network as a way to mitigate the spectrum scarcity problem and enables a slice to control its users mobility across different access networks. In this paper, we propose a mobility management architecture based network slicing where each slice manages its users across heterogeneous radio access technologies such as WiFi, LTE and 5G networks. In this architecture, each slice has a different mobility demands and these demands are governed by a network slice configuration and service characteristics. Therefore, our mobility management architecture follows a modular approach where each slice has individual module to handle the mobility demands and enforce the slice policy for mobility management. The advantages of applying our proposed architecture include: i) Sharing network resources between different network slices; ii) creating logical platform to unify different RATs resources and allowing all slices to share them; iii) satisfying slice mobility demands.

Mobile Information Systems, 2018
In the last years, we have witnessed the introduction of the Internet of Things (IoT) as an integ... more In the last years, we have witnessed the introduction of the Internet of Things (IoT) as an integral part of the Internet with billions of interconnected and addressable everyday objects. On one hand, these objects generate a massive volume of data that can be exploited to gain useful insights into our day-to-day needs. On the other hand, context-aware recommender systems (CARSs) are intelligent systems that assist users to make service consumption choices that satisfy their preferences based on their contextual situations. However, one of the key challenges facing the development and deployment of CARSs is the lack of functionality for providing dynamic and reliable context information required by the recommendation decision process. Thus, data obtained from IoT objects and other sources can be exploited to build CARSs that satisfy users’ preferences, improve quality of experience, and boost recommendation accuracy. This article describes various components of a conceptual IoT-base...

Webology, 2022
Broken characters restoration represents the major challenge of optical character recognition (OC... more Broken characters restoration represents the major challenge of optical character recognition (OCR). Active contours, which have been used successfully to restore ancient documents with high degradations have drawback in restoring characters with deep concavity boundaries. Deep concavity problem represents the main obstacle, which has prevented Gradient Vector Flow active contour in converge to objects with complex concavity boundaries. In this paper, we proposed a technique to enhance (GVF) active contour using particle swarm optimization (PSO) through directing snake points (snaxels) toward correct positions into deep concavity boundaries of broken characters by comparing with genetic algorithms as an optimization method. Our experimental results showed that particle swarm optimization outperform on genetic algorithm to correct capturing the converged areas and save spent time in optimization process.

2017 14th International Conference on Telecommunications (ConTEL), 2017
Internet of Things (IoT) is the future of ubiquitous and personalized intelligent service deliver... more Internet of Things (IoT) is the future of ubiquitous and personalized intelligent service delivery. It consists of interconnected, addressable and communicating everyday objects. To realize the full potentials of this new generation of ubiquitous systems, IoT's 'smart' objects should be supported with intelligent platforms for data acquisition, pre-processing, classification, modeling, reasoning and inference including distribution. However, some current IoT systems lack these capabilities: they provide mainly the functionality for raw sensor data acquisition. In this paper, we propose a framework towards deriving high-level context information from streams of raw IoT sensor data, using artificial neural network (ANN) as context recognition model. Before building the model, raw sensor data were pre-processed using weighted average low-pass filtering and a sliding window algorithm. From the resulting windows, statistical features were extracted to train ANN models. Analysis and evaluation of the proposed system show that it achieved between 87.3% and 98.1% accuracies.
2017 ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K)

Sensors (Basel, Switzerland), 2020
The World Health Organization (WHO) in 2016 considered m-health as: “the use of mobile wireless t... more The World Health Organization (WHO) in 2016 considered m-health as: “the use of mobile wireless technologies including smart devices such as smartphones and smartwatches for public health”. WHO emphasizes the potential of this technology to increase its use in accessing health information and services as well as promoting positive changes in health behaviours and overall management of diseases. In this regard, the capability of smartphones and smartwatches for m-health monitoring through the collection of patient data remotely, has become an important component in m-health system. It is important that the integrity of the data collected is verified continuously through data authentication before storage. In this research work, we extracted heart rate variability (HRV) and decomposed the signals into sub-bands of detail and approximation coefficients. A comparison analysis is done after the classification of the extracted features to select the best sub-bands. An architectural framew...

The World Health Organization(WHO) in 2016 considered mHealth as: “the use of mobile wireless tec... more The World Health Organization(WHO) in 2016 considered mHealth as: “the use of mobile wireless technologies including smart devices such as smartphones and smartwatches for public health” as an important resource for health services delivery and public health given their ease of use, broad reach and acceptance. WHO emphasizes the potential of this technology to increase access to health information, services and skills as well as promoting positive changes in health behaviors and management of diseases. In this regard, the capability of smartphones and smartwatches for m-health monitoring as well as verification of the patient the signal has become an important component of mHealth system. Most of the smartwatches could extract more than one bioelectrical signal therefore, therefore they provide suitable platform for extracting health data for e-monitoring. The existing approaches have not considered the integrity of data obtained from these smart devices. Therefore, it is important ...

ArXiv, 2020
Palm vein identification (PVI) is a modern biometric security technique used for increasing secur... more Palm vein identification (PVI) is a modern biometric security technique used for increasing security and authentication systems. The key characteristics of palm vein patterns include, its uniqueness to each individual, unforgettable, non-intrusive and cannot be taken by an unauthorized person. However, the extracted features from the palm vein pattern are huge with high redundancy. In this paper, we propose a combine model of two-Dimensional Discrete Wavelet Transform, Principal Component Analysis (PCA), and Particle Swarm Optimization (PSO) (2D-DWTPP) to enhance prediction of vein palm patterns. The 2D-DWT Extracts features from palm vein images, PCA reduces the redundancy in palm vein features. The system has been trained in selecting high reverent features based on the wrapper model. The PSO feeds wrapper model by an optimal subset of features. The proposed system uses four classifiers as an objective function to determine VPI which include Support Vector Machine (SVM), K Nearest...

Current Trends in Computer Sciences & Applications
one who has the credentials irrespective of the knowledge of the authenticity of the authentic us... more one who has the credentials irrespective of the knowledge of the authenticity of the authentic user. Adopting a mixture and layers of different types of authentication methods can protect the system better from unauthorized users. Some of the most common second factor authentication methods adopted by financial institutions like banks are use of PIN sentry, memorable word, and OTP (One Time Password) [2-5]. Financial organizations like Barclays even uses second or third factor authentication depending on the online activity and the session keys are generated based on factors like knowing user memorable PIN, transaction amount, smart card information, physical card availability etc. using Chip Authentication Program like PIN sentry, but detail internal methods and techniques are not available in public domain due to security reasons and one such security framework for card reader is presented by [2]. In a PIN sentry approach, it reads the card details and using the secret pin, one-time 8-digit pin password is generated to authenticate.

Sensors (Basel, Switzerland), 2020
With the widespread use of embedded sensing capabilities of mobile devices, there has been unprec... more With the widespread use of embedded sensing capabilities of mobile devices, there has been unprecedented development of context-aware solutions. This allows the proliferation of various intelligent applications, such as those for remote health and lifestyle monitoring, intelligent personalized services, etc. However, activity context recognition based on multivariate time series signals obtained from mobile devices in unconstrained conditions is naturally prone to imbalance class problems. This means that recognition models tend to predict classes with the majority number of samples whilst ignoring classes with the least number of samples, resulting in poor generalization. To address this problem, we propose augmentation of the time series signals from inertial sensors with signals from ambient sensing to train Deep Convolutional Neural Network (DCNNs) models. DCNNs provide the characteristics that capture local dependency and scale invariance of these combined sensor signals. Conse...

Deep Sensing: Inertia and Ambient Sensing for Activity Context Recognition Using Deep Convolutional Neural Networks
With the widespread of embedded sensing capabilities of mobile devices, there has been unpreceden... more With the widespread of embedded sensing capabilities of mobile devices, there has been unprecedented development of context-aware solutions. This allows the proliferation of various intelligent applications such as those for remote health and lifestyle monitoring, intelligent personalized services, etc. However, activity context recognition based on multivariate time series signals obtained from mobile devices in unconstrained conditions is naturally prone to imbalance class problems. This means that recognition models tend to predict classes with the majority number of samples whilst ignoring classes with the least number of samples, resulting in poor generalization. To address this problem, we propose to augment the time series signals from inertia sensors with signals from ambient sensing to train deep convolutional neural networks (DCNN) models. DCNN provides the characteristics that capture local dependency and scale invariance of these combined sensor signals. Consequently, we...
Uploads
Papers by Abayomi Otebolaku