Daniel Aliu - Academia.edu (original) (raw)

Papers by Daniel Aliu

Research paper thumbnail of Challenges Associated with Wearable Internet-of-Things (IoTs) Monitoring Systems for E-Health

FUOYE Journal of Engineering and Technology, Dec 29, 2023

Research paper thumbnail of A Computer Security System for Cloud Computing Based on Encryption Technique

Computer Engineering and Applications Journal

In recent years, progressively data proprietors have embraced cloud storage service, by which the... more In recent years, progressively data proprietors have embraced cloud storage service, by which they will subcontract their data to the cloud server to significantly reduce the local storage overhead, due to the rapid growth in the cloud computing market and development. Cloud computing is the delivery of hosting services that are provided to clients over the web. It is quite common, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that may be rapidly provisioned and released with minimal management effort or service provider interaction. Sensitive information on the cloud is developing unexpectedly and bringing up several challenges and massive security concerns of the modern-day world. The cloud data and services reside in massively scalable data centers and may be accessed ubiquitously. Some issues concern in accessing this data is the security and confidentiality of consumer dat...

Research paper thumbnail of A Smart Real-Time Standalone Route Recognition System for Visually Impaired Persons

Computer Engineering and Applications Journal

Visual Impairment is a common disability that results in poor or no eyesight, whose victims suffe... more Visual Impairment is a common disability that results in poor or no eyesight, whose victims suffer inconveniences in performing their daily tasks. Visually impaired persons require some aids to interact with their environment safely. Existing navigation systems like electronic travel aids (ETAs) are mostly cloud-based and rely heavily on the internet and google map. This implies that systems deployment in locations with poor internet facilities and poorly structured environments is not feasible. This paper proposed a smart real-time standalone route recognition system for visually impaired persons. The proposed system makes use of a pedestrian route network, an interconnection of paths and their associated route tables, for providing directions of known locations in real-time for the user. Federal University of Technology (FUT), Minna, Gidan Kwanu campus was used as the case study. The result obtained from testing of the device search strategy on the field showed that the complexity...

Research paper thumbnail of Complementarity Problem Approach to Economic Power Dispatch of Nigeria Power System

ATBU Journal of Science, Technology and Education, Jul 9, 2020

Research paper thumbnail of Development of a Robust Digital Image Watermarking Technique in Discrete Orthonormal Stockwell Transform Domain Based on Photon Polarization

Research paper thumbnail of Design and Construction of 1.SKVA Uninterrupted Power Supply (Ups) System

Research paper thumbnail of A Review on Data Hiding Based on Digital Watermarking Technique for Improving Secure data communication

ATBU Journal of Science, Technology and Education, 2018

In recent years, the use of multimedia contents (image, audio, video and text) is rapidly increas... more In recent years, the use of multimedia contents (image, audio, video and text) is rapidly increasing with the high growth and widespread use of the Internet and information technology. Due to this fact, tampering and illegal distribution of digital contents is inevitable because of their digital nature and as such it becomes imperative to devise mechanisms to protect such contents. Several mechanisms that have been proposed for data hiding are cryptography, steganography and watermarking. One of such mechanisms that have been attracting major interest is digital watermarking as it provides one of the best solutions among the proposed mechanisms. This is because watermarking has given an effective ways of data copyright protection or illegal duplication of digital data. Watermarking is a technique that is used to preclude duplicating or to shield digital data by imperceptibly hiding authorized sign information into the original data. The major challenge of watermarking technique is t...

Research paper thumbnail of Blockchain Adoption: Applications and Challenges

International Journal of Software Engineering and Computer Systems, 2021

In recent times, more scholastic and social attention have been paid to blockchain and its distri... more In recent times, more scholastic and social attention have been paid to blockchain and its distributed ledger system mechanism. The reasons for this ever-increasing attention cannot be far-fetched: blockchain now occupies a copious position in the present-day ways of doing things economically, digitally and ‘digital-socially’. Blockchain could be described as a distributed ledger system that allows secure transactions without a central management system. In this distributed ledger system, transactions are coded into blocks, which are linked to each other in the form of a chain. The first application of blockchain is in the bitcoin cryptocurrency. Though not limited to bitcoin, blockchain finds usefulness in security and trusts for instance, digital assets could be coded into blocks to ensure and enforce quality of trust. Consequent upon the quality of trust the blockchain confers on a digital asset, transparency among participating nodes is guaranteed. This is because, any change ma...

Research paper thumbnail of ICT: Providing Sustainable Economic and Social Development in a Ubiquitous Network Society

International Journal of Scientific Research in Science and Technology, 2020

The development of the traditional infrastructure of any country would facilitate and enhance inf... more The development of the traditional infrastructure of any country would facilitate and enhance information society. However, inadequate infrastructural development, poor economic and social access, slow adoption of new technology and limited technical know-how are some dilemma plaguing ICT application and implementation in the Nigeria context. This paper therefore, is poised toward addressing these issues and proffering recommendations with the aim of supporting government efforts, increasing the efficiency of social service delivery and raising economic efficiency and cost reduction in ICT related mechanism. It is hoped that ICT applications and usage would lead to systemic growth, economic development, and the provision of socio-economic sustainability in Nigeria.

Research paper thumbnail of Optimal Resource Scheduling Algorithm for Ofdma-Based Multicast Traffic Delivery Over Wimax Networks Using Particle Swarm Optimization

International Journal of Software Engineering and Computer Systems, 2021

Researchers are yet to entirely mapped out the difficulty in allocating optimal resources to mobi... more Researchers are yet to entirely mapped out the difficulty in allocating optimal resources to mobile Worldwide Interoperability for Microwave Access (WiMAX) subscribers. This research presents an optimal scheduling algorithm for WiMAX resource allocation based on an Particle Swarm Optimization (PSO). In this work, sub-group creation is used to offer a PSO-based technique for allocating subcarriers and Orthogonal Frequency Division Multiplexing (OFDM) symbols to mobile WiMAX customers. The WiMAX network environment is organized into seven layers, with seven different modulation and coding algorithms proposed for sending packets to subscribers within each layer. By adopting an improved PSO-based WiMAX resource allocation method, an enhanced model for throughput maximization and channel data rate was implemented. The Aggregate Data Rate (ADR) and Channel Data Rate (CDR) for each scenario were obtained by simulating several scenarios of WiMAX multicast service to mobile users. Based on t...

Research paper thumbnail of Challenges Associated with Wearable Internet-of-Things (IoTs) Monitoring Systems for E-Health

FUOYE Journal of Engineering and Technology, Dec 29, 2023

Research paper thumbnail of A Computer Security System for Cloud Computing Based on Encryption Technique

Computer Engineering and Applications Journal

In recent years, progressively data proprietors have embraced cloud storage service, by which the... more In recent years, progressively data proprietors have embraced cloud storage service, by which they will subcontract their data to the cloud server to significantly reduce the local storage overhead, due to the rapid growth in the cloud computing market and development. Cloud computing is the delivery of hosting services that are provided to clients over the web. It is quite common, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that may be rapidly provisioned and released with minimal management effort or service provider interaction. Sensitive information on the cloud is developing unexpectedly and bringing up several challenges and massive security concerns of the modern-day world. The cloud data and services reside in massively scalable data centers and may be accessed ubiquitously. Some issues concern in accessing this data is the security and confidentiality of consumer dat...

Research paper thumbnail of A Smart Real-Time Standalone Route Recognition System for Visually Impaired Persons

Computer Engineering and Applications Journal

Visual Impairment is a common disability that results in poor or no eyesight, whose victims suffe... more Visual Impairment is a common disability that results in poor or no eyesight, whose victims suffer inconveniences in performing their daily tasks. Visually impaired persons require some aids to interact with their environment safely. Existing navigation systems like electronic travel aids (ETAs) are mostly cloud-based and rely heavily on the internet and google map. This implies that systems deployment in locations with poor internet facilities and poorly structured environments is not feasible. This paper proposed a smart real-time standalone route recognition system for visually impaired persons. The proposed system makes use of a pedestrian route network, an interconnection of paths and their associated route tables, for providing directions of known locations in real-time for the user. Federal University of Technology (FUT), Minna, Gidan Kwanu campus was used as the case study. The result obtained from testing of the device search strategy on the field showed that the complexity...

Research paper thumbnail of Complementarity Problem Approach to Economic Power Dispatch of Nigeria Power System

ATBU Journal of Science, Technology and Education, Jul 9, 2020

Research paper thumbnail of Development of a Robust Digital Image Watermarking Technique in Discrete Orthonormal Stockwell Transform Domain Based on Photon Polarization

Research paper thumbnail of Design and Construction of 1.SKVA Uninterrupted Power Supply (Ups) System

Research paper thumbnail of A Review on Data Hiding Based on Digital Watermarking Technique for Improving Secure data communication

ATBU Journal of Science, Technology and Education, 2018

In recent years, the use of multimedia contents (image, audio, video and text) is rapidly increas... more In recent years, the use of multimedia contents (image, audio, video and text) is rapidly increasing with the high growth and widespread use of the Internet and information technology. Due to this fact, tampering and illegal distribution of digital contents is inevitable because of their digital nature and as such it becomes imperative to devise mechanisms to protect such contents. Several mechanisms that have been proposed for data hiding are cryptography, steganography and watermarking. One of such mechanisms that have been attracting major interest is digital watermarking as it provides one of the best solutions among the proposed mechanisms. This is because watermarking has given an effective ways of data copyright protection or illegal duplication of digital data. Watermarking is a technique that is used to preclude duplicating or to shield digital data by imperceptibly hiding authorized sign information into the original data. The major challenge of watermarking technique is t...

Research paper thumbnail of Blockchain Adoption: Applications and Challenges

International Journal of Software Engineering and Computer Systems, 2021

In recent times, more scholastic and social attention have been paid to blockchain and its distri... more In recent times, more scholastic and social attention have been paid to blockchain and its distributed ledger system mechanism. The reasons for this ever-increasing attention cannot be far-fetched: blockchain now occupies a copious position in the present-day ways of doing things economically, digitally and ‘digital-socially’. Blockchain could be described as a distributed ledger system that allows secure transactions without a central management system. In this distributed ledger system, transactions are coded into blocks, which are linked to each other in the form of a chain. The first application of blockchain is in the bitcoin cryptocurrency. Though not limited to bitcoin, blockchain finds usefulness in security and trusts for instance, digital assets could be coded into blocks to ensure and enforce quality of trust. Consequent upon the quality of trust the blockchain confers on a digital asset, transparency among participating nodes is guaranteed. This is because, any change ma...

Research paper thumbnail of ICT: Providing Sustainable Economic and Social Development in a Ubiquitous Network Society

International Journal of Scientific Research in Science and Technology, 2020

The development of the traditional infrastructure of any country would facilitate and enhance inf... more The development of the traditional infrastructure of any country would facilitate and enhance information society. However, inadequate infrastructural development, poor economic and social access, slow adoption of new technology and limited technical know-how are some dilemma plaguing ICT application and implementation in the Nigeria context. This paper therefore, is poised toward addressing these issues and proffering recommendations with the aim of supporting government efforts, increasing the efficiency of social service delivery and raising economic efficiency and cost reduction in ICT related mechanism. It is hoped that ICT applications and usage would lead to systemic growth, economic development, and the provision of socio-economic sustainability in Nigeria.

Research paper thumbnail of Optimal Resource Scheduling Algorithm for Ofdma-Based Multicast Traffic Delivery Over Wimax Networks Using Particle Swarm Optimization

International Journal of Software Engineering and Computer Systems, 2021

Researchers are yet to entirely mapped out the difficulty in allocating optimal resources to mobi... more Researchers are yet to entirely mapped out the difficulty in allocating optimal resources to mobile Worldwide Interoperability for Microwave Access (WiMAX) subscribers. This research presents an optimal scheduling algorithm for WiMAX resource allocation based on an Particle Swarm Optimization (PSO). In this work, sub-group creation is used to offer a PSO-based technique for allocating subcarriers and Orthogonal Frequency Division Multiplexing (OFDM) symbols to mobile WiMAX customers. The WiMAX network environment is organized into seven layers, with seven different modulation and coding algorithms proposed for sending packets to subscribers within each layer. By adopting an improved PSO-based WiMAX resource allocation method, an enhanced model for throughput maximization and channel data rate was implemented. The Aggregate Data Rate (ADR) and Channel Data Rate (CDR) for each scenario were obtained by simulating several scenarios of WiMAX multicast service to mobile users. Based on t...