oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 6 )

2018 ( 11 )

2017 ( 17 )

2016 ( 13 )

Custom range...

Search Results: 1 - 10 of 905 matches for " Clement Onime "
All listed articles are free for downloading (OA Articles)
Page 1 /905
Display every page Item
3D Mobile Augmented Reality Interface for Laboratory Experiments  [PDF]
Clement Onime, Olatunde Abiona
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2016, DOI: 10.4236/ijcns.2016.94006
Abstract: In fields such as science and engineering, virtual environment is commonly used to provide replacements for practical hands-on laboratories. Sometimes, these environments take the form of a remote interface to the physical laboratory apparatus and at other times, in the form of a complete software implementation that simulates the laboratory apparatus. In this paper, we report on the use of a semi-immersive 3D mobile Augmented Reality (mAR) interface and limited simulations as a replacement for practical hands-on laboratories in science and engineering. The 3D-mAR based interfaces implementations for three different experiments (from micro-electronics, power and communications engineering) are presented; the discovered limitations are discussed along with the results of an evaluation by science and engineering students from two different institutions and plans for future work.
Analysis of a Cyclic Multicast Proxy Server Architecture  [PDF]
Olatunde ABIONA, Tricha ANJALI, Clement ONIME, Lawrence KEHINDE
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2008, DOI: 10.4236/ijcns.2008.14037
Abstract: The exponential growths of the World Wide Web (WWW) users have made the deployment of proxy servers popular on a network with limited resources. WWW clients perceive better response time, improved performance and speed when response to requested pages are served from the cache of a proxy server, resulting in faster response times after the first document fetch. This work proposes cyclic multicast as a scalable technique for improving proxy server performance for next generation networks. The proposed system uses a cyclic multicast engine for the delivery of popular web pages from the proxy server cache to increasingly large users under limited server capacity and network resources. The cyclic multicast technique would be more efficient for the delivery of highly requested web pages from the cache to large number of receivers. We describe the operation of the cyclic multicast proxy server and characterized the gains in performance.
A Load Balancing Policy for Distributed Web Service  [PDF]
Safiriyu Eludiora, Olatunde Abiona, Ganiyu Aderounmu, Ayodeji Oluwatope, Clement Onime, Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2010, DOI: 10.4236/ijcns.2010.38087
Abstract: The proliferation of web services; and users appeal for high scalability, availability and reliability of web servers to provide rapid response and high throughput for the Clients’ requests occurring at anytime. Distributed Web Servers (DWSs) provide an effective solution for improving the quality of web services. This paper addresses un-regulated jobs/tasks migration among the servers. Considering distributed web services with several servers running, a lot of bandwidth is wasted due to unnecessary job migration. Having considered bandwidth optimization, it is important to develop a policy that will address the bandwidth consumption while loads/tasks are being transferred among the servers. The goal of this work is to regulate this movement to minimize bandwidth consumption. From literatures, little or no attention was given to this problem, making it difficult to implement some of these policies/schemes in bandwidth scarce environment. Our policy “Cooperative Adaptive Symmetrical Initiated Dynamic/Diffusion (CASID)” was developed using Java Development Environment (JADE) a middle ware service oriented environment which is agent-based. The software was used to simulate events (jobs distribution) on the servers. With no job transfer allowed when all servers are busy, any over loaded server process jobs internally to completion. We achieved this by having two different agents; static cognitive agents and dynamic cognitive agents. The results were compared with the existing schemes. CASID policy outperforms PLB scheme in terms of response time and system throughput.
A User Identity Management Protocol for Cloud Computing Paradigm  [PDF]
Safiriyu Eludiora, Olatunde Abiona, Ayodeji Oluwatope, Adeniran Oluwaranti, Clement Onime, Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2011, DOI: 10.4236/ijcns.2011.43019
Abstract: Cloud computing paradigm is a service oriented system that delivers services to the customer at low cost. Cloud computing needs to address three main security issues: confidentiality, integrity and availability. In this paper, we propose user identity management protocol for cloud computing customers and cloud service providers. This protocol will authenticate and authorize customers/providers in other to achieve global security networks. The protocol will be developed to achieve the set global security objectives in cloud computing environments. Confidentiality, integrity and availability are the key challenges of web services’ or utility providers. A layered protocol design is proposed for cloud computing systems, the physical, networks and application layer. However, each layer will integrate existing security features such as firewalls, NIDS, NIPS, Anti-DDOS and others to prevent security threats and attacks. System vulnerability is critical to the cloud computing facilities; the proposed protocol will address this as part of measures to secure data at all levels. The protocol will protect customers/cloud service providers’ infrastructure by preventing unauthorized users to gain access to the service/facility.
A Scalable Architecture for Network Traffic Monitoring and Analysis Using Free Open Source Software  [PDF]
Olatunde ABIONA, Temitope ALADESANMI, Clement ONIME, Adeniran OLUWARANTI, Ayodeji OLUWATOPE, Olakanmi ADEWARA, Tricha ANJALI, Lawrence KEHINDE
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2009, DOI: 10.4236/ijcns.2009.26058
Abstract: The lack of current network dynamics studies that evaluate the effects of new application and protocol deployment or long-term studies that observe the effect of incremental changes on the Internet, and the change in the overall stability of the Internet under various conditions and threats has made network monitoring challenging. A good understanding of the nature and type of network traffic is the key to solving congestion problems. In this paper we describe the architecture and implementation of a scalable network traffic moni-toring and analysis system. The gigabit interface on the monitoring system was configured to capture network traffic and the Multi Router Traffic Grapher (MRTG) and Webalizer produces graphical and detailed traffic analysis. This system is in use at the Obafemi Awolowo University, IleIfe, Nigeria; we describe how this system can be replicated in another environment.
Wireless Network Security: The Mobile Agent Approach  [PDF]
Olatunde Abiona, Adeniran Oluwaranti, Ayodeji Oluwatope, Surura Bello, Clement Onime, Mistura Sanni, Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2013, DOI: 10.4236/ijcns.2013.610046
Abstract: The broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access to the wireless networks. The present 802.1× authentication scheme has some flaws, making mutual authentication impossible and open to man-in-the-middle attacks. These characteristics make traditional cryptographic mechanism provide weak security for the wireless environment. We have proposed the use of mobile agents to provide dependable Internet services delivery to users, this will guarantee secure authentication in wireless networks and we examine the feasibility of our solution and propose a model for wireless network security.
Proxy Server Experiment and Network Security with Changing Nature of the Web  [PDF]
Olatunde Abiona, Adeniran Oluwaranti, Ayodeji Oluwatope, Surura Bello, Clement Onime, Mistura Sanni, Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2014, DOI: 10.4236/ijcns.2014.712052
Abstract: The total reliance on internet connectivity and World Wide Web (WWW) based services is forcing many organizations to look for alternative solutions for providing adequate access and response time to the demand of their ever increasing users. A typical solution is to increase the bandwidth; this can be achieved with additional cost, but this solution does not scale nor decrease users perceived response time. Another concern is the security of their network. An alternative scalable solution is to deploy a proxy server to provide adequate access and improve response time as well as provide some level of security for clients using the network. While some studies have reported performance increase due to the use of proxy servers, one study has reported performance decrease due to proxy server. We then conducted a six-month proxy server experiment. During this period, we collected access logs from three different proxy servers and analyzed these logs with Webalizer a web server log file analysis program. After a few years, in September 2010, we collected log files from another proxy server, analyzed the logs using Webalizer and compared our results. The result of the analysis showed that the hit rate of the proxy servers ranged between 21% - 39% and over 70% of web pages were dynamic. Furthermore clients accessing the internet through a proxy server are more secured. We then conclude that although the nature of the web is changing, the proxy server is still capable of improving performance by decreasing response time perceived by web clients and improved network security.
Ito’s Formula for the Discrete-Time Quantum Walk in Two Dimensions  [PDF]
Clement Ampadu
Journal of Quantum Information Science (JQIS) , 2012, DOI: 10.4236/jqis.2012.22008
Abstract: Following Konno [1], it is natural to ask: What is the Ito’s formula for the discrete time quantum walk on a graph different than Z, the set of integers? In this paper we answer the question for the discrete time quantum walk on Z2, the square lattice.
On Some Questions of C. Ampadu Associated with the Quantum Random Walk  [PDF]
Clement Ampadu
Applied Mathematics (AM) , 2014, DOI: 10.4236/am.2014.519291
Abstract: We review (not exhaustively) the quantum random walk on the line in various settings, and propose some questions that we believe have not been tackled in the literature. In a sense, this article invites the readers (beginner, intermediate, or advanced), to explore the beautiful area of quantum random walks.
Metaphoric Topicality in Femi Osofisan’s Drama  [PDF]
Clement O. Ajidahun
Advances in Literary Study (ALS) , 2013, DOI: 10.4236/als.2013.11001
Abstract: This paper examines the functional and the significant role of metaphors in literary works. It discusses the centrality of metaphors as a dominant literary device consciously deployed by Femi Osofisan to project the theme of oppression, dehumanization, social injustice and poverty in his plays. The paper focuses on the use of animal and predatory metaphors in Osofisan’s plays to launch an offensive literary attack on the rich and the ruling elite in the society who use their privileged positions to brazenly oppress and brutalize the poor and the downtrodden. The paper, on the other hand, examines the appropriate use of animal metaphors to enlighten and educate the poor on their precarious condition as preys in the hands of the carnivorous ruling class. Finally, the paper discusses the settings and the titles of Osofisan’s plays, the quest motif and the traditional modes as metaphors for oppression.
Page 1 /905
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.