Falaye Adeyinka A

Work place: Department of Computer Science, Federal University of Technology Minna , Niger state, 920211, Nigeria.

E-mail: falaye.adeyinka@futminna.edu.ng

Website:

Research Interests: Network Security, Information Security

Biography

Mr. Adeyinka Adesuyi Falaye (October 7, 1974) is currently a lecturer at the School of Information and Communication Technology, Department of Computer Science, Federal University of Technoloy Minna,Nigeria. Prior to this in 2007 through 2016, he was a Lecturer at Department of Mathematics and Statistics in the same University.He received his MS, and BTECH in Computer Science from University of Lagos (Nigeria) and Mathematics with Computer Science from Federal University of Technology, Minna (Nigeria) respectively. His research is mainly focused on Cyber security within Critical National Infrastructure, System Modelling & Simulation, Risk Management, Complex and Policy Analysis and Epidemiology.

Author Articles
A Mathematical Model for Capturing Cholera Spread and Containment Options

By Falaye Adeyinka A Akarawak E.E.E. COLE A.T. Evans O. Patience Oluyori David Adeyemi Falaye Roseline Adunola Adama Ndako Victor

DOI: https://doi.org/10.5815/ijmsc.2018.01.02, Pub. Date: 8 Jan. 2018

The explosive nature of cholera epidemic over the years in different parts of the world has been a subject of interest to scientists in proffering interventions towards controlling its spread. Over the years many models has been created by the following people Capaso and Pavari – Fontana (1973), Codeco (2001), Hartley, Tien (2009), Mukandivare (2009) etc. In the present study, we modify the Cholera model proposed by Mukandivare incorporating three (3) containment options such as vaccination, Therapeutic treatment and water treatment and solved the system analytically using Homotopy Perturbation Method. The results shows that with improved use of vaccination, therapy and proper sanitation we have a more healthy population. This research is therefore recommended to modelers who desire to know how homotopy perturbation methods works. The computations were done and further analyzed mathematically using a computer symbolic package MAPLE 13.

[...] Read more.
Parametric Equation for Capturing Dynamics of Cyber Attack Malware Transmission with Mitigation on Computer Network

By Falaye Adeyinka A Etuk Stella Oluyemi Adama Ndako Victor Ugwuoke Cosmas Uchenna Olujimi Ogedengbe Seun Ale

DOI: https://doi.org/10.5815/ijmsc.2017.04.04, Pub. Date: 8 Nov. 2017

One distress of network and data security professionals and advisers globally is about the abilities of infectious malicious agents (Malware) to invade the entire network terminals to wreak havoc extending from identity theft, financial fraud to systemic digital assault on critical national resources. This work studies the behavioural dynamics of the susceptible, infected, the recovered terminals on the mobile wireless network and the effective use of antivirus security signature as countermeasure. Solving for stability state, we found out that its Eigen value gives a positive value which means that the stability is at an unstable state. Using Homotopy perturbation to calculate the approximate solution of the system. The expression derived was simulated using a mathematical tool (mat lab).

[...] Read more.
Other Articles