oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Search Results: 1 - 10 of 116 matches for " Olatunde Abiona "
All listed articles are free for downloading (OA Articles)
Page 1 /116
Display every page Item
3D Mobile Augmented Reality Interface for Laboratory Experiments  [PDF]
Clement Onime, Olatunde Abiona
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2016, DOI: 10.4236/ijcns.2016.94006
Abstract: In fields such as science and engineering, virtual environment is commonly used to provide replacements for practical hands-on laboratories. Sometimes, these environments take the form of a remote interface to the physical laboratory apparatus and at other times, in the form of a complete software implementation that simulates the laboratory apparatus. In this paper, we report on the use of a semi-immersive 3D mobile Augmented Reality (mAR) interface and limited simulations as a replacement for practical hands-on laboratories in science and engineering. The 3D-mAR based interfaces implementations for three different experiments (from micro-electronics, power and communications engineering) are presented; the discovered limitations are discussed along with the results of an evaluation by science and engineering students from two different institutions and plans for future work.
Analysis of a Cyclic Multicast Proxy Server Architecture  [PDF]
Olatunde ABIONA, Tricha ANJALI, Clement ONIME, Lawrence KEHINDE
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2008, DOI: 10.4236/ijcns.2008.14037
Abstract: The exponential growths of the World Wide Web (WWW) users have made the deployment of proxy servers popular on a network with limited resources. WWW clients perceive better response time, improved performance and speed when response to requested pages are served from the cache of a proxy server, resulting in faster response times after the first document fetch. This work proposes cyclic multicast as a scalable technique for improving proxy server performance for next generation networks. The proposed system uses a cyclic multicast engine for the delivery of popular web pages from the proxy server cache to increasingly large users under limited server capacity and network resources. The cyclic multicast technique would be more efficient for the delivery of highly requested web pages from the cache to large number of receivers. We describe the operation of the cyclic multicast proxy server and characterized the gains in performance.
A Load Balancing Policy for Distributed Web Service  [PDF]
Safiriyu Eludiora, Olatunde Abiona, Ganiyu Aderounmu, Ayodeji Oluwatope, Clement Onime, Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2010, DOI: 10.4236/ijcns.2010.38087
Abstract: The proliferation of web services; and users appeal for high scalability, availability and reliability of web servers to provide rapid response and high throughput for the Clients’ requests occurring at anytime. Distributed Web Servers (DWSs) provide an effective solution for improving the quality of web services. This paper addresses un-regulated jobs/tasks migration among the servers. Considering distributed web services with several servers running, a lot of bandwidth is wasted due to unnecessary job migration. Having considered bandwidth optimization, it is important to develop a policy that will address the bandwidth consumption while loads/tasks are being transferred among the servers. The goal of this work is to regulate this movement to minimize bandwidth consumption. From literatures, little or no attention was given to this problem, making it difficult to implement some of these policies/schemes in bandwidth scarce environment. Our policy “Cooperative Adaptive Symmetrical Initiated Dynamic/Diffusion (CASID)” was developed using Java Development Environment (JADE) a middle ware service oriented environment which is agent-based. The software was used to simulate events (jobs distribution) on the servers. With no job transfer allowed when all servers are busy, any over loaded server process jobs internally to completion. We achieved this by having two different agents; static cognitive agents and dynamic cognitive agents. The results were compared with the existing schemes. CASID policy outperforms PLB scheme in terms of response time and system throughput.
A User Identity Management Protocol for Cloud Computing Paradigm  [PDF]
Safiriyu Eludiora, Olatunde Abiona, Ayodeji Oluwatope, Adeniran Oluwaranti, Clement Onime, Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2011, DOI: 10.4236/ijcns.2011.43019
Abstract: Cloud computing paradigm is a service oriented system that delivers services to the customer at low cost. Cloud computing needs to address three main security issues: confidentiality, integrity and availability. In this paper, we propose user identity management protocol for cloud computing customers and cloud service providers. This protocol will authenticate and authorize customers/providers in other to achieve global security networks. The protocol will be developed to achieve the set global security objectives in cloud computing environments. Confidentiality, integrity and availability are the key challenges of web services’ or utility providers. A layered protocol design is proposed for cloud computing systems, the physical, networks and application layer. However, each layer will integrate existing security features such as firewalls, NIDS, NIPS, Anti-DDOS and others to prevent security threats and attacks. System vulnerability is critical to the cloud computing facilities; the proposed protocol will address this as part of measures to secure data at all levels. The protocol will protect customers/cloud service providers’ infrastructure by preventing unauthorized users to gain access to the service/facility.
A Scalable Architecture for Network Traffic Monitoring and Analysis Using Free Open Source Software  [PDF]
Olatunde ABIONA, Temitope ALADESANMI, Clement ONIME, Adeniran OLUWARANTI, Ayodeji OLUWATOPE, Olakanmi ADEWARA, Tricha ANJALI, Lawrence KEHINDE
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2009, DOI: 10.4236/ijcns.2009.26058
Abstract: The lack of current network dynamics studies that evaluate the effects of new application and protocol deployment or long-term studies that observe the effect of incremental changes on the Internet, and the change in the overall stability of the Internet under various conditions and threats has made network monitoring challenging. A good understanding of the nature and type of network traffic is the key to solving congestion problems. In this paper we describe the architecture and implementation of a scalable network traffic moni-toring and analysis system. The gigabit interface on the monitoring system was configured to capture network traffic and the Multi Router Traffic Grapher (MRTG) and Webalizer produces graphical and detailed traffic analysis. This system is in use at the Obafemi Awolowo University, IleIfe, Nigeria; we describe how this system can be replicated in another environment.
Wireless Network Security: The Mobile Agent Approach  [PDF]
Olatunde Abiona, Adeniran Oluwaranti, Ayodeji Oluwatope, Surura Bello, Clement Onime, Mistura Sanni, Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2013, DOI: 10.4236/ijcns.2013.610046
Abstract: The broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access to the wireless networks. The present 802.1× authentication scheme has some flaws, making mutual authentication impossible and open to man-in-the-middle attacks. These characteristics make traditional cryptographic mechanism provide weak security for the wireless environment. We have proposed the use of mobile agents to provide dependable Internet services delivery to users, this will guarantee secure authentication in wireless networks and we examine the feasibility of our solution and propose a model for wireless network security.
Proxy Server Experiment and Network Security with Changing Nature of the Web  [PDF]
Olatunde Abiona, Adeniran Oluwaranti, Ayodeji Oluwatope, Surura Bello, Clement Onime, Mistura Sanni, Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2014, DOI: 10.4236/ijcns.2014.712052
Abstract: The total reliance on internet connectivity and World Wide Web (WWW) based services is forcing many organizations to look for alternative solutions for providing adequate access and response time to the demand of their ever increasing users. A typical solution is to increase the bandwidth; this can be achieved with additional cost, but this solution does not scale nor decrease users perceived response time. Another concern is the security of their network. An alternative scalable solution is to deploy a proxy server to provide adequate access and improve response time as well as provide some level of security for clients using the network. While some studies have reported performance increase due to the use of proxy servers, one study has reported performance decrease due to proxy server. We then conducted a six-month proxy server experiment. During this period, we collected access logs from three different proxy servers and analyzed these logs with Webalizer a web server log file analysis program. After a few years, in September 2010, we collected log files from another proxy server, analyzed the logs using Webalizer and compared our results. The result of the analysis showed that the hit rate of the proxy servers ranged between 21% - 39% and over 70% of web pages were dynamic. Furthermore clients accessing the internet through a proxy server are more secured. We then conclude that although the nature of the web is changing, the proxy server is still capable of improving performance by decreasing response time perceived by web clients and improved network security.
TCP Window Based Congestion Control -Slow-Start Approach  [PDF]
Kolawole I. Oyeyinka, Ayodeji O. Oluwatope, Adio. T. Akinwale, Olusegun Folorunso, Ganiyu A. Aderounmu, Olatunde O. Abiona
Communications and Network (CN) , 2011, DOI: 10.4236/cn.2011.32011
Abstract: Transmission control protocol (TCP) has undergone several transformations. Several proposals have been put forward to change the mechanisms of TCP congestion control to improve its performance. A line of research tends to reduce speed in the face of congestion thereby penalizing itself. In this group are the window based congestion control algorithms that use the size of congestion window to determine transmission speed. The two main algorithm of window based congestion control are the congestion avoidance and the slow start. The aim of this study is to survey the various modifications of window based congestion control. Much work has been done on congestion avoidance hence specific attention is placed on the slow start in order to motivate a new direction of research in network utility maximization. Mathematical modeling of the internet is discussed and proposals to improve TCP startup were reviewed. There are three lines of research on the improvement of slow start. A group uses the estimation of certain parameters to determine initial speed. The second group uses bandwidth estimation while the last group uses explicit request for network assistance to determine initial startup speed. The problems of each proposal are analyzed and a multiple startup for TCP is proposed. Multiple startups for TCP specify that startup speed is selectable from an n-arry set of algorithms. We then introduced the e-speed start which uses the prevailing network condition to determine a suitable starting speed.
Asymmetric Oil Price Shock Response: A Comparative Analysis  [PDF]
Olukorede Abiona
Open Journal of Social Sciences (JSS) , 2014, DOI: 10.4236/jss.2014.24041
Abstract: This paper extends the literature on the effects of oil-price shocks using United States, Norway and South Africa as case studies between 1980 and 2010. The Structural Vector Autoregressive (SVAR) and Panel VAR methodologies are employed as an extension to the conventional unrestricted Vector Autoregressive (VAR) model. Results show that the developed economies (United States and Norway) stick to the non-linear oil-price shock specifications as argued in the literature. However, these are not feasible within the context of the emerging net-oil importing economy. Furthermore, Structural Vector Autoregressive (SVAR) model decisively restricts the oil-price shock effects while the effects intended to be captured may have been overruled by the identification restrictions imposed. Nevertheless, the Panel VAR methodology is able to accommodate all oil-price shock specifications. The claim that there exists a transmission mechanism through which positive oil price shock accruals can be beneficial to the global community was empirically verified using Foreign Direct Investment (FDI) as a proxy. In the other way round, there is suggestive evidence of possible unprecedented and unsatisfactory effects during negative oil-price shock periods.
Explanatory Models of Inmate HIV Risk Behaviors: Does a Fatalistic Model Exist?  [PDF]
Joseph A. Balogun, Titilayo C. Abiona Abiona, Ivonne K. Anguh
World Journal of AIDS (WJA) , 2015, DOI: 10.4236/wja.2015.52008
Abstract: The deprivation, importation, situational, and administrative control models have been used to explain inmate violence. More recently, HIV risk behaviors of inmates have been explained with the deprivation and importation models. The goal of this study is to assess the utility of these models in describing inmate HIV risk behaviors and to identify additional models that may exist. Forty seven ex-offenders released from prison within three months of the study were recruited from a community based organization. They participated in focus group discussions that explored the contexts surrounding inmate engagement in HIV risk behaviors in prison. Data were analyzed using NVivo 7 and results were organized into themes. Inmates engaged in sex in exchange for money and for affection. Inmates who were drug users before incarceration were more likely to abuse drugs in prison. Security measures, if effective, deterred the entrance of illegal substance into prison, but when security is lax, inmates take the opportunity to engage in sex, and illegal substances are brought into prison. Our results reveal that deprivation, importation, situational, and administrative control factors are associated with HIV risk behaviors among inmates and they can be used in explaining these behaviors. The association of risk behaviors with long or life sentences suggests that fatalism may play a role in risk behaviors among inmates. Fatalism is a factor which requires future examination.
Page 1 /116
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.