Daniel Aliu - Academia.edu (original) (raw)
Papers by Daniel Aliu
FUOYE Journal of Engineering and Technology, Dec 29, 2023
Computer Engineering and Applications Journal
In recent years, progressively data proprietors have embraced cloud storage service, by which the... more In recent years, progressively data proprietors have embraced cloud storage service, by which they will subcontract their data to the cloud server to significantly reduce the local storage overhead, due to the rapid growth in the cloud computing market and development. Cloud computing is the delivery of hosting services that are provided to clients over the web. It is quite common, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that may be rapidly provisioned and released with minimal management effort or service provider interaction. Sensitive information on the cloud is developing unexpectedly and bringing up several challenges and massive security concerns of the modern-day world. The cloud data and services reside in massively scalable data centers and may be accessed ubiquitously. Some issues concern in accessing this data is the security and confidentiality of consumer dat...
Computer Engineering and Applications Journal
Visual Impairment is a common disability that results in poor or no eyesight, whose victims suffe... more Visual Impairment is a common disability that results in poor or no eyesight, whose victims suffer inconveniences in performing their daily tasks. Visually impaired persons require some aids to interact with their environment safely. Existing navigation systems like electronic travel aids (ETAs) are mostly cloud-based and rely heavily on the internet and google map. This implies that systems deployment in locations with poor internet facilities and poorly structured environments is not feasible. This paper proposed a smart real-time standalone route recognition system for visually impaired persons. The proposed system makes use of a pedestrian route network, an interconnection of paths and their associated route tables, for providing directions of known locations in real-time for the user. Federal University of Technology (FUT), Minna, Gidan Kwanu campus was used as the case study. The result obtained from testing of the device search strategy on the field showed that the complexity...
ATBU Journal of Science, Technology and Education, Jul 9, 2020
ATBU Journal of Science, Technology and Education, 2018
In recent years, the use of multimedia contents (image, audio, video and text) is rapidly increas... more In recent years, the use of multimedia contents (image, audio, video and text) is rapidly increasing with the high growth and widespread use of the Internet and information technology. Due to this fact, tampering and illegal distribution of digital contents is inevitable because of their digital nature and as such it becomes imperative to devise mechanisms to protect such contents. Several mechanisms that have been proposed for data hiding are cryptography, steganography and watermarking. One of such mechanisms that have been attracting major interest is digital watermarking as it provides one of the best solutions among the proposed mechanisms. This is because watermarking has given an effective ways of data copyright protection or illegal duplication of digital data. Watermarking is a technique that is used to preclude duplicating or to shield digital data by imperceptibly hiding authorized sign information into the original data. The major challenge of watermarking technique is t...
International Journal of Software Engineering and Computer Systems, 2021
In recent times, more scholastic and social attention have been paid to blockchain and its distri... more In recent times, more scholastic and social attention have been paid to blockchain and its distributed ledger system mechanism. The reasons for this ever-increasing attention cannot be far-fetched: blockchain now occupies a copious position in the present-day ways of doing things economically, digitally and ‘digital-socially’. Blockchain could be described as a distributed ledger system that allows secure transactions without a central management system. In this distributed ledger system, transactions are coded into blocks, which are linked to each other in the form of a chain. The first application of blockchain is in the bitcoin cryptocurrency. Though not limited to bitcoin, blockchain finds usefulness in security and trusts for instance, digital assets could be coded into blocks to ensure and enforce quality of trust. Consequent upon the quality of trust the blockchain confers on a digital asset, transparency among participating nodes is guaranteed. This is because, any change ma...
International Journal of Scientific Research in Science and Technology, 2020
The development of the traditional infrastructure of any country would facilitate and enhance inf... more The development of the traditional infrastructure of any country would facilitate and enhance information society. However, inadequate infrastructural development, poor economic and social access, slow adoption of new technology and limited technical know-how are some dilemma plaguing ICT application and implementation in the Nigeria context. This paper therefore, is poised toward addressing these issues and proffering recommendations with the aim of supporting government efforts, increasing the efficiency of social service delivery and raising economic efficiency and cost reduction in ICT related mechanism. It is hoped that ICT applications and usage would lead to systemic growth, economic development, and the provision of socio-economic sustainability in Nigeria.
International Journal of Software Engineering and Computer Systems, 2021
Researchers are yet to entirely mapped out the difficulty in allocating optimal resources to mobi... more Researchers are yet to entirely mapped out the difficulty in allocating optimal resources to mobile Worldwide Interoperability for Microwave Access (WiMAX) subscribers. This research presents an optimal scheduling algorithm for WiMAX resource allocation based on an Particle Swarm Optimization (PSO). In this work, sub-group creation is used to offer a PSO-based technique for allocating subcarriers and Orthogonal Frequency Division Multiplexing (OFDM) symbols to mobile WiMAX customers. The WiMAX network environment is organized into seven layers, with seven different modulation and coding algorithms proposed for sending packets to subscribers within each layer. By adopting an improved PSO-based WiMAX resource allocation method, an enhanced model for throughput maximization and channel data rate was implemented. The Aggregate Data Rate (ADR) and Channel Data Rate (CDR) for each scenario were obtained by simulating several scenarios of WiMAX multicast service to mobile users. Based on t...
FUOYE Journal of Engineering and Technology, Dec 29, 2023
Computer Engineering and Applications Journal
In recent years, progressively data proprietors have embraced cloud storage service, by which the... more In recent years, progressively data proprietors have embraced cloud storage service, by which they will subcontract their data to the cloud server to significantly reduce the local storage overhead, due to the rapid growth in the cloud computing market and development. Cloud computing is the delivery of hosting services that are provided to clients over the web. It is quite common, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that may be rapidly provisioned and released with minimal management effort or service provider interaction. Sensitive information on the cloud is developing unexpectedly and bringing up several challenges and massive security concerns of the modern-day world. The cloud data and services reside in massively scalable data centers and may be accessed ubiquitously. Some issues concern in accessing this data is the security and confidentiality of consumer dat...
Computer Engineering and Applications Journal
Visual Impairment is a common disability that results in poor or no eyesight, whose victims suffe... more Visual Impairment is a common disability that results in poor or no eyesight, whose victims suffer inconveniences in performing their daily tasks. Visually impaired persons require some aids to interact with their environment safely. Existing navigation systems like electronic travel aids (ETAs) are mostly cloud-based and rely heavily on the internet and google map. This implies that systems deployment in locations with poor internet facilities and poorly structured environments is not feasible. This paper proposed a smart real-time standalone route recognition system for visually impaired persons. The proposed system makes use of a pedestrian route network, an interconnection of paths and their associated route tables, for providing directions of known locations in real-time for the user. Federal University of Technology (FUT), Minna, Gidan Kwanu campus was used as the case study. The result obtained from testing of the device search strategy on the field showed that the complexity...
ATBU Journal of Science, Technology and Education, Jul 9, 2020
ATBU Journal of Science, Technology and Education, 2018
In recent years, the use of multimedia contents (image, audio, video and text) is rapidly increas... more In recent years, the use of multimedia contents (image, audio, video and text) is rapidly increasing with the high growth and widespread use of the Internet and information technology. Due to this fact, tampering and illegal distribution of digital contents is inevitable because of their digital nature and as such it becomes imperative to devise mechanisms to protect such contents. Several mechanisms that have been proposed for data hiding are cryptography, steganography and watermarking. One of such mechanisms that have been attracting major interest is digital watermarking as it provides one of the best solutions among the proposed mechanisms. This is because watermarking has given an effective ways of data copyright protection or illegal duplication of digital data. Watermarking is a technique that is used to preclude duplicating or to shield digital data by imperceptibly hiding authorized sign information into the original data. The major challenge of watermarking technique is t...
International Journal of Software Engineering and Computer Systems, 2021
In recent times, more scholastic and social attention have been paid to blockchain and its distri... more In recent times, more scholastic and social attention have been paid to blockchain and its distributed ledger system mechanism. The reasons for this ever-increasing attention cannot be far-fetched: blockchain now occupies a copious position in the present-day ways of doing things economically, digitally and ‘digital-socially’. Blockchain could be described as a distributed ledger system that allows secure transactions without a central management system. In this distributed ledger system, transactions are coded into blocks, which are linked to each other in the form of a chain. The first application of blockchain is in the bitcoin cryptocurrency. Though not limited to bitcoin, blockchain finds usefulness in security and trusts for instance, digital assets could be coded into blocks to ensure and enforce quality of trust. Consequent upon the quality of trust the blockchain confers on a digital asset, transparency among participating nodes is guaranteed. This is because, any change ma...
International Journal of Scientific Research in Science and Technology, 2020
The development of the traditional infrastructure of any country would facilitate and enhance inf... more The development of the traditional infrastructure of any country would facilitate and enhance information society. However, inadequate infrastructural development, poor economic and social access, slow adoption of new technology and limited technical know-how are some dilemma plaguing ICT application and implementation in the Nigeria context. This paper therefore, is poised toward addressing these issues and proffering recommendations with the aim of supporting government efforts, increasing the efficiency of social service delivery and raising economic efficiency and cost reduction in ICT related mechanism. It is hoped that ICT applications and usage would lead to systemic growth, economic development, and the provision of socio-economic sustainability in Nigeria.
International Journal of Software Engineering and Computer Systems, 2021
Researchers are yet to entirely mapped out the difficulty in allocating optimal resources to mobi... more Researchers are yet to entirely mapped out the difficulty in allocating optimal resources to mobile Worldwide Interoperability for Microwave Access (WiMAX) subscribers. This research presents an optimal scheduling algorithm for WiMAX resource allocation based on an Particle Swarm Optimization (PSO). In this work, sub-group creation is used to offer a PSO-based technique for allocating subcarriers and Orthogonal Frequency Division Multiplexing (OFDM) symbols to mobile WiMAX customers. The WiMAX network environment is organized into seven layers, with seven different modulation and coding algorithms proposed for sending packets to subscribers within each layer. By adopting an improved PSO-based WiMAX resource allocation method, an enhanced model for throughput maximization and channel data rate was implemented. The Aggregate Data Rate (ADR) and Channel Data Rate (CDR) for each scenario were obtained by simulating several scenarios of WiMAX multicast service to mobile users. Based on t...