Joshua A . Abolarinwa | Federal University of Technology, Minna (original) (raw)
Conference Presentations by Joshua A . Abolarinwa
INTERNATIONAL ENGINEERING CONFERENCE IEC 2019, 2019
The growth of the telecommunication industry is fast-paced with groundbreaking engineering achiev... more The growth of the telecommunication industry is fast-paced with groundbreaking engineering achievements. Notwithstanding the technological advancement in the industry, it had continued to cope with the phenomenon of resource constraint in portable mobile telecommunication devices compared to fixed and tethered devices. Portable mobile handheld devices have very low computational, storage and energy carrying capacity occasioned by the needs to satisfy portability, very small form factor, ergonomics, style and trends. Solutions such as cloudlets, cyber foraging, mobile cloud computing (MCC), and more recently but most applicable, multi-access edge computing (MEC) have been proffered with different application methodologies including computational offloading, distributed computing, thin clients, middleware, mobile environment cloning as well as representational state transfer. There is a need to satisfy requirements of new and emerging use cases, especially the deployments of 5G coming up with applications such as virtual reality (VR), augmented reality (AR), intelligent transport systems (ITS), connected autonomous vehicle (CAV), smart hospitals, ultra high definition multi-feed live streaming, etc. The usage patterns of most of these different applications, though not always, is ephemeral and on-demand, except that the demand will be numerous, huge, asymmetric and highly latency-sensitive in terms of needs for computation, storage and analytics while at the fringe of the network where data are being generated and results being applied. In this research, we evaluated 5G end-to-end transport for vantage location of MEC server to achieve low user plane latency.
Papers by Joshua A . Abolarinwa
Proceedings of the International Conference on Advanced Technologies
It has been observed that domestic household bins are still being manually collected by the munic... more It has been observed that domestic household bins are still being manually collected by the municipality. This old method of trash removal has flaws. It is labour-intensive. In this paper, we design and implement a novel innovative domestic waste management system. To achieve this aim, specific objectives had to be achieved. These were to design and implement a motor driver controller (MDC), obstacle detection system (ODS), email notification system, trash status monitoring, internet time-based trigger (ITT), and finally, integrating all the systems together. The project was divided into two phases: the design phase and the integration phase. The finished prototype was tested and demonstrated to function according to the design specifications. When the bin is empty, the system remains at the origin. Only when the bin is full that the system moves to the disposal point. When an obstacle is detected, it stops and sends a push notification via email to the user. Once the obstacle is re...
International Journal of Multimedia and Ubiquitous Engineering, 2015
Cognitive radio-based wireless sensor network is the next-generation sensor network paradigm. Imp... more Cognitive radio-based wireless sensor network is the next-generation sensor network paradigm. Important to this emerging sensor network is the need to reduce energy consumption, paving way for 'green' communication among sensor nodes. Therefore, in this paper, we have proposed an energy-efficient, learning-inspired, adaptive and dynamic channel decision and access technique for cognitive radio-based wireless sensor networks. Using intelligent learning technique based on the previous experience, the cognitive radio-based wireless sensor network agent decides which available channel to access based on the energy-efficiency achievable by transmitting using the channel. From simulation results, we found that as the channel packet availability increases, the energyefficiency of the channel increase. This lends credence to the fact that the proposed learning-inspired algorithm is significantly energy-efficient for cognitive radio-based wireless sensor networks.
Social Science Research Network, 2023
Social Science Research Network, 2023
International journal of engineering and technology, 2015
Recent advancements in the field of cognitive radio technology have paved way for cognitive radio... more Recent advancements in the field of cognitive radio technology have paved way for cognitive radio-based wireless sensor networks. This has been tipped to be the next generation sensor. Spectrum sensing and energy efficient channel access are two important operations in this network. In this paper, we propose the use of machine learning and decision making capability of reinforcement learning to address the problem of energy efficiency associated with channel access in cognitive radio aided sensor networks. A simple learning algorithm was developed to improve network parameters such as secondary user throughput, channel availability in relation to the sensing time. Comparing the results obtained from simulations with other channel access without intelligent learning such as random channel assignment and dynamic channel assignment, the learning algorithm produced better performance in terms of throughput, energy efficiency and other quality of service requirement of the network applic...
ABSTRACTThe growth of the telecommunication industry is fast-paced with ground-breaking engineeri... more ABSTRACTThe growth of the telecommunication industry is fast-paced with ground-breaking engineering achievements. Notwithstanding the technological advancement in the industry, it had continued to cope with the phenomenon ofresource constraint in portable mobile telecommunication devices compared to fixed and tethered devices. Portable mobile handheld devices have very low computational, storage and energy carrying capacity occasioned by the needs to satisfy portability, very small form factor, ergonomics, style and trends. Solutions such as cloudlets, cyber foraging, mobile cloud computing (MCC), and more recently but most applicable, multi-access edge computing (MEC) have been proffered with different application methodologies including computational offloading, distributed computing, thin clients, middleware, mobile environment cloning as well as representational state transfer. There is a need to satisfy requirements of new and emerging use cases, especially the deployments of 5...
2009 International Conference on Power Engineering, Energy and Electrical Drives, 2009
Battery chargers come in different shapes, sizes and capacities, but it is difficult (if not rare... more Battery chargers come in different shapes, sizes and capacities, but it is difficult (if not rare) to find one charger unit that regulates overcharge and can charge different battery voltages. This work uses the basic electrical principles and ICs, to design a user friendly charger circuit that manually adjusts the voltage depending on the voltage of the battery, (6volts, 9volts and 12volts was considered because it is generally available). The circuit charges in three modes namely: Burst charging, trickle charging and pulse charging. It also incorporates a Liquid Crystal Display (LCD) to display the voltage that is being charged. The circuit also uses a Pulse Width Modulator (PWM) in order to control the duty cycle and voltage. The circuit also has an overcharge and over discharge protection. This remarkable charger saves the user time and resources needed to purchase three different chargers for three batteries, with different voltages. From the result obtained the built battery charger was able to charge 6volts (10Ah), 9volts (1200mAh) and 12volts (10Ah) battery to 100% state of charge. The charging time for the 6volts battery was 2hours 24 minutes, 2 hours 36 minutes for the 9volts battery and 2 hours 30 minutes for the 12volts battery.
Cogent Engineering, 2022
Improved constraints on sedimentary environments of palygorskite deposits of the Hawthorne Format... more Improved constraints on sedimentary environments of palygorskite deposits of the Hawthorne Formation, southern Georgia from a detailed study of a core Mark P. S. Krekeler, Stephen Guggenheim and John Rakovan. A microtexture study of palygorskiterich sediments from the Hawthorne Formation, southern Georgia by transmission electron microscopy and atomic force microscopy Dimitri Papoulis, Panayota Tsolis-Katagas and Christos Katagas. Progressive stages in the formation of kaolin minerals of different morphologies in the weathering of plagioclase Mark us Eg li, Aldo Mirab ella, Al essandro Mancabelli and Giacomo Sartori. Weathering of soils in alpine areas as influenced by climate and parent material Wanda Alló. Authigenic Ti-bearing crystals in a Precambrian clay from Buenos Aires Province, Argentina Chandrika Varadachari and Gargi Mukherjee. D isc rimi na nt a nal ysis of c l a y m ine ra l compositions
The process of developing effective Radar target detection systems depends largely on the improve... more The process of developing effective Radar target detection systems depends largely on the improved performance rate of the Constant False Alarm Rate (CFAR) technique deployed within the Radar system. These CFAR techniques typically estimate adaptive threshold values with the aim to maximize the probability of detection while maintaining the desired probability of false alarm. In this paper, we present a modified Otsu based CFAR algorithm that automatically estimates an effective adaptive threshold by processing each data sample within a given reference window for radar target detection. The performance of the proposed algorithm was evaluated using real-life acquired Radar return signals and the results obtained indicate that our algorithm performs similarly to the optimum (cell averaging) CA CFAR detector in a homogeneous environment, while typically outperforming other CFAR algorithms in similar conditions. Keyword— Adaptive, CFAR, Detection Probability, False alarm probability, Mo...
International Engineering Conference, Federal University of Technology Minna, 2019
The growth of the telecommunication industry is fast-paced with groundbreaking engineering achiev... more The growth of the telecommunication industry is fast-paced with groundbreaking engineering achievements. Notwithstanding the technological advancement in the industry, it had continued to cope with the phenomenon of resource constraint in portable mobile telecommunication devices compared to fixed and tethered devices. Portable mobile handheld devices have very low computational, storage and energy carrying capacity occasioned by the needs to satisfy portability, very small form factor, ergonomics, style and trends. Solutions such as cloudlets, cyber foraging, mobile cloud computing (MCC), and more recently but most applicable, multi-access edge computing (MEC) have been proffered with different application methodologies including computational offloading, distributed computing, thin clients, middleware, mobile environment cloning as well as representational state transfer. There is a need to satisfy requirements of new and emerging use cases, especially the deployments of 5G coming up with applications such as virtual reality (VR), augmented reality (AR), intelligent transport systems (ITS), connected autonomous vehicle (CAV), smart hospitals, ultra high definition multi-feed live streaming, etc. The usage patterns of most of these different applications, though not always, is ephemeral and on-demand, except that the demand will be numerous, huge, asymmetric and highly latency-sensitive in terms of needs for computation, storage and analytics while at the fringe of the network where data are being generated and results being applied. In this research, we evaluated 5G end-to-end transport for vantage location of MEC server to achieve low user plane latency.
INTERNATIONAL ENGINEERING CONFERENCE IEC 2019, 2019
The growth of the telecommunication industry is fast-paced with groundbreaking engineering achiev... more The growth of the telecommunication industry is fast-paced with groundbreaking engineering achievements. Notwithstanding the technological advancement in the industry, it had continued to cope with the phenomenon of resource constraint in portable mobile telecommunication devices compared to fixed and tethered devices. Portable mobile handheld devices have very low computational, storage and energy carrying capacity occasioned by the needs to satisfy portability, very small form factor, ergonomics, style and trends. Solutions such as cloudlets, cyber foraging, mobile cloud computing (MCC), and more recently but most applicable, multi-access edge computing (MEC) have been proffered with different application methodologies including computational offloading, distributed computing, thin clients, middleware, mobile environment cloning as well as representational state transfer. There is a need to satisfy requirements of new and emerging use cases, especially the deployments of 5G coming up with applications such as virtual reality (VR), augmented reality (AR), intelligent transport systems (ITS), connected autonomous vehicle (CAV), smart hospitals, ultra high definition multi-feed live streaming, etc. The usage patterns of most of these different applications, though not always, is ephemeral and on-demand, except that the demand will be numerous, huge, asymmetric and highly latency-sensitive in terms of needs for computation, storage and analytics while at the fringe of the network where data are being generated and results being applied. In this research, we evaluated 5G end-to-end transport for vantage location of MEC server to achieve low user plane latency.
Proceedings of the International Conference on Advanced Technologies
It has been observed that domestic household bins are still being manually collected by the munic... more It has been observed that domestic household bins are still being manually collected by the municipality. This old method of trash removal has flaws. It is labour-intensive. In this paper, we design and implement a novel innovative domestic waste management system. To achieve this aim, specific objectives had to be achieved. These were to design and implement a motor driver controller (MDC), obstacle detection system (ODS), email notification system, trash status monitoring, internet time-based trigger (ITT), and finally, integrating all the systems together. The project was divided into two phases: the design phase and the integration phase. The finished prototype was tested and demonstrated to function according to the design specifications. When the bin is empty, the system remains at the origin. Only when the bin is full that the system moves to the disposal point. When an obstacle is detected, it stops and sends a push notification via email to the user. Once the obstacle is re...
International Journal of Multimedia and Ubiquitous Engineering, 2015
Cognitive radio-based wireless sensor network is the next-generation sensor network paradigm. Imp... more Cognitive radio-based wireless sensor network is the next-generation sensor network paradigm. Important to this emerging sensor network is the need to reduce energy consumption, paving way for 'green' communication among sensor nodes. Therefore, in this paper, we have proposed an energy-efficient, learning-inspired, adaptive and dynamic channel decision and access technique for cognitive radio-based wireless sensor networks. Using intelligent learning technique based on the previous experience, the cognitive radio-based wireless sensor network agent decides which available channel to access based on the energy-efficiency achievable by transmitting using the channel. From simulation results, we found that as the channel packet availability increases, the energyefficiency of the channel increase. This lends credence to the fact that the proposed learning-inspired algorithm is significantly energy-efficient for cognitive radio-based wireless sensor networks.
Social Science Research Network, 2023
Social Science Research Network, 2023
International journal of engineering and technology, 2015
Recent advancements in the field of cognitive radio technology have paved way for cognitive radio... more Recent advancements in the field of cognitive radio technology have paved way for cognitive radio-based wireless sensor networks. This has been tipped to be the next generation sensor. Spectrum sensing and energy efficient channel access are two important operations in this network. In this paper, we propose the use of machine learning and decision making capability of reinforcement learning to address the problem of energy efficiency associated with channel access in cognitive radio aided sensor networks. A simple learning algorithm was developed to improve network parameters such as secondary user throughput, channel availability in relation to the sensing time. Comparing the results obtained from simulations with other channel access without intelligent learning such as random channel assignment and dynamic channel assignment, the learning algorithm produced better performance in terms of throughput, energy efficiency and other quality of service requirement of the network applic...
ABSTRACTThe growth of the telecommunication industry is fast-paced with ground-breaking engineeri... more ABSTRACTThe growth of the telecommunication industry is fast-paced with ground-breaking engineering achievements. Notwithstanding the technological advancement in the industry, it had continued to cope with the phenomenon ofresource constraint in portable mobile telecommunication devices compared to fixed and tethered devices. Portable mobile handheld devices have very low computational, storage and energy carrying capacity occasioned by the needs to satisfy portability, very small form factor, ergonomics, style and trends. Solutions such as cloudlets, cyber foraging, mobile cloud computing (MCC), and more recently but most applicable, multi-access edge computing (MEC) have been proffered with different application methodologies including computational offloading, distributed computing, thin clients, middleware, mobile environment cloning as well as representational state transfer. There is a need to satisfy requirements of new and emerging use cases, especially the deployments of 5...
2009 International Conference on Power Engineering, Energy and Electrical Drives, 2009
Battery chargers come in different shapes, sizes and capacities, but it is difficult (if not rare... more Battery chargers come in different shapes, sizes and capacities, but it is difficult (if not rare) to find one charger unit that regulates overcharge and can charge different battery voltages. This work uses the basic electrical principles and ICs, to design a user friendly charger circuit that manually adjusts the voltage depending on the voltage of the battery, (6volts, 9volts and 12volts was considered because it is generally available). The circuit charges in three modes namely: Burst charging, trickle charging and pulse charging. It also incorporates a Liquid Crystal Display (LCD) to display the voltage that is being charged. The circuit also uses a Pulse Width Modulator (PWM) in order to control the duty cycle and voltage. The circuit also has an overcharge and over discharge protection. This remarkable charger saves the user time and resources needed to purchase three different chargers for three batteries, with different voltages. From the result obtained the built battery charger was able to charge 6volts (10Ah), 9volts (1200mAh) and 12volts (10Ah) battery to 100% state of charge. The charging time for the 6volts battery was 2hours 24 minutes, 2 hours 36 minutes for the 9volts battery and 2 hours 30 minutes for the 12volts battery.
Cogent Engineering, 2022
Improved constraints on sedimentary environments of palygorskite deposits of the Hawthorne Format... more Improved constraints on sedimentary environments of palygorskite deposits of the Hawthorne Formation, southern Georgia from a detailed study of a core Mark P. S. Krekeler, Stephen Guggenheim and John Rakovan. A microtexture study of palygorskiterich sediments from the Hawthorne Formation, southern Georgia by transmission electron microscopy and atomic force microscopy Dimitri Papoulis, Panayota Tsolis-Katagas and Christos Katagas. Progressive stages in the formation of kaolin minerals of different morphologies in the weathering of plagioclase Mark us Eg li, Aldo Mirab ella, Al essandro Mancabelli and Giacomo Sartori. Weathering of soils in alpine areas as influenced by climate and parent material Wanda Alló. Authigenic Ti-bearing crystals in a Precambrian clay from Buenos Aires Province, Argentina Chandrika Varadachari and Gargi Mukherjee. D isc rimi na nt a nal ysis of c l a y m ine ra l compositions
The process of developing effective Radar target detection systems depends largely on the improve... more The process of developing effective Radar target detection systems depends largely on the improved performance rate of the Constant False Alarm Rate (CFAR) technique deployed within the Radar system. These CFAR techniques typically estimate adaptive threshold values with the aim to maximize the probability of detection while maintaining the desired probability of false alarm. In this paper, we present a modified Otsu based CFAR algorithm that automatically estimates an effective adaptive threshold by processing each data sample within a given reference window for radar target detection. The performance of the proposed algorithm was evaluated using real-life acquired Radar return signals and the results obtained indicate that our algorithm performs similarly to the optimum (cell averaging) CA CFAR detector in a homogeneous environment, while typically outperforming other CFAR algorithms in similar conditions. Keyword— Adaptive, CFAR, Detection Probability, False alarm probability, Mo...
International Engineering Conference, Federal University of Technology Minna, 2019
The growth of the telecommunication industry is fast-paced with groundbreaking engineering achiev... more The growth of the telecommunication industry is fast-paced with groundbreaking engineering achievements. Notwithstanding the technological advancement in the industry, it had continued to cope with the phenomenon of resource constraint in portable mobile telecommunication devices compared to fixed and tethered devices. Portable mobile handheld devices have very low computational, storage and energy carrying capacity occasioned by the needs to satisfy portability, very small form factor, ergonomics, style and trends. Solutions such as cloudlets, cyber foraging, mobile cloud computing (MCC), and more recently but most applicable, multi-access edge computing (MEC) have been proffered with different application methodologies including computational offloading, distributed computing, thin clients, middleware, mobile environment cloning as well as representational state transfer. There is a need to satisfy requirements of new and emerging use cases, especially the deployments of 5G coming up with applications such as virtual reality (VR), augmented reality (AR), intelligent transport systems (ITS), connected autonomous vehicle (CAV), smart hospitals, ultra high definition multi-feed live streaming, etc. The usage patterns of most of these different applications, though not always, is ephemeral and on-demand, except that the demand will be numerous, huge, asymmetric and highly latency-sensitive in terms of needs for computation, storage and analytics while at the fringe of the network where data are being generated and results being applied. In this research, we evaluated 5G end-to-end transport for vantage location of MEC server to achieve low user plane latency.