scispace - formally typeset
Search or ask a question

Showing papers by "Aderemi A. Atayero published in 2011"


01 Oct 2011
TL;DR: The security issues affecting cloud computing are presented and the use of homomorphic encryption as a panacea for dealing with these serious security concerns vis-a-vis the access to cloud data is proposed.
Abstract: The prominence of the place of cloud computing in future converged networks is incontestable. This is due to the obvious advantages of the cloud as a medium of storage with ubiquity of access platforms and minimal hardware requirements on the user end. Secure delivery of data to and from the cloud is however a serious issue that needs to be addressed. We present in this paper the security issues affecting cloud computing and propose the use of homomorphic encryption as a panacea for dealing with these serious security concerns vis-a-vis the access to cloud data.

85 citations


01 Nov 2011
TL;DR: An overview of both the core and access networks of LTE, based on an evolved architecture that makes it a candidate of choice for next generation wireless mobile networks is provided.
Abstract: The evolution of wireless networks is a continuous phenomenon. Some key trends in this changing process include: reduced latency, increased performance with substantial reduction in costs, and seamless mobility. Long Term Evolution (LTE) is based on an evolved architecture that makes it a candidate of choice for next generation wireless mobile networks. This paper provides an overview of both the core and access networks of LTE. Functional details of the associated protocols and interfaces are also presented.

38 citations



01 Oct 2011
TL;DR: The acquisition of eye-iris images of dark-skinned subjects in Africa, a predominant case of very- dark-brown iris images, under near-infrared illumination is presented.
Abstract:  Abstract— Iris recognition algorithms, especially with the emergence of large-scale iris-based identification systems, must be tested for speed and accuracy and evaluated with a wide range of templates - large size, long-range, visible and different origins. This paper presents the acquisition of eye-iris images of dark-skinned subjects in Africa, a predominant case of very- dark-brown iris images, under near-infrared illumination. The peculiarity of these iris images is highlighted from the histogram and normal probability distribution of their grayscale image entropy (GiE) values, in comparison to Asian and Caucasian iris images. The acquisition of eye-images for the African iris dataset is ongoing and will be made publicly- available as soon as it is sufficiently populated.

4 citations


01 Oct 2011
TL;DR: Simulation results of modeling video streaming over wireless communications networks show conclusively that in a transmission network with a small error probabilities, the minimum bit rate guarantees an acceptable video quality, corresponding to MOS > 3 for all types of frames.
Abstract: The spate in popularity of multimedia applications has led to the need for optimization of bandwidth allocation and usage in telecommunication networks. Modern telecommunication networks should by their definition be able to maintain the quality of different applications with different Quality of Service (QoS) levels. QoS requirements are generally dependent on the parameters of network and application layers of the OSI model. At the application layer QoS depends on factors such as resolution, bit rate, frame rate, video type, audio codecs, etc. At the network layer, distortions such as delay, jitter, packet loss, etc. are introduced. This paper presents simulation results of modeling video streaming over wireless communications networks. The differences in spatial and time characteristics of the different subject groups were taken into account. Analysis of the influence of bit error rate (BER) and bit rate for video quality is also presented. Simulation showed that different video subject groups affect the perceived quality differently when transmitted over networks. We show conclusively that in a transmission network with a small error probabilities (BER = 10-6, BER = 10-5), the minimum bit rate (128 kbps) guarantees an acceptable video quality, corresponding to MOS > 3 for all types of frames.

3 citations


Journal ArticleDOI
TL;DR: A novel method of estimating the quality of video sequences even when parts of the frame is missing, by means of searching out contextually similar frames and “gluing” them in lieu of the lost frames is presented.
Abstract: This paper presents a method for assessing desynchronized video with the aid of a software package specially developed for this purpose. A unique methodology of substituting values for lost frames was developed. It is shown that in the event of non-similarity of the sent and received sequences because of the loss of some frames in transit, the estimation of the quality indicator via traditional (existing) software is done inaccurately. We present in this paper a novel method of estimating the quality of desynchronized video streams. The developed software application is able to carry out the estimation of the quality of video sequences even when parts of the frame is missing, by means of searching out contextually similar frames and “gluing” them in lieu of the lost frames. Comparing obtained results with those from existing software validates their accuracy. The difference in results and methods of estimating video sequences of different subject groups is also discussed. The paper concludes with adequate recommendations on the best methodology to adopt for specific estimation scenarios.

3 citations


01 Dec 2011
TL;DR: iSpeak is described – a system designed to reduce the human-to-human interaction in the complaint-lodging and solution provision process to a minimal level where it is not possible to eradicate it totally by a replacement with human–to–system (H2S) interactivity.
Abstract: A constant source of frustration for subscribers of mobile telephony in Nigeria is the quality of customer care service. The ubiquitous IVR systems deployed by service providers often ends in long and winding texting of digits that terminate in calls to agents with poor CRM attitudes. Automation of most of the functions of the human agent goes a long way in mitigating this problem. This paper describes iSpeak – a system designed to reduce the human–to–human (H2H) interaction in the complaint-lodging and solution provision process to a minimal level where it is not possible to eradicate it totally by a replacement with human–to–system (H2S) interactivity. iSpeak has an inherent capacity for improving the efficiency and drastically cutting CRM cost of corporate organizations. This comes with the attendant advantage of improved business-customer relationship. Keywords – Automatic Speech Recognition, Customer Care Service, Speech-control, Customer Voice Model, Voice Print, Voice Recognition.

3 citations


01 Oct 2011
TL;DR: In this paper, the authors examined the impact of satellite communication on developing economies, using popular examples as case study and found that satellite communication is an excellent option for meeting this and many other pressing communication needs of developing economies.
Abstract: Access to information and communication infrastructure greatly enhances economic growth. When a reliable and affordable medium for information exchange is available, previously unanticipated developments ensue. Most areas in developing countries are sparsely populated and highly rural. Satellite communication is an excellent option for meeting this and many other pressing communication needs of developing economies. This paper examines the impact of satellite communication on developing economies, using popular examples as case study.

1 citations


Proceedings ArticleDOI
27 Oct 2011
TL;DR: The use of wavelet-transform modulus-maxima method (WTMM) for calculating statistical sum, which is more accurate in discovering the singularity of a signal, is presented.
Abstract: Recent advances in ubiquitous broadband access networks have engendered an increase in research activities in the area of network teletraffic. We present in this paper the use of wavelet-transform modulus-maxima method (WTMM) for calculating statistical sum, which is more accurate in discovering the singularity of a signal. Data sets made available by the Lincoln Laboratory of MIT (1999 DARPA Intrusion Detection Evaluation) were analyzed as the test sequence. Analysis of the presented dependencies showed that the differences between two sets are manifested in their multifractal spectra, constructed using software based on WTMM method that was developed in the course of this work. These differences exist regardless of the amount of levels of scaling decomposition involved in the analysis. The values of boundary parameters of the spectra α min and α max are almost always different for two realizations and can likewise serve as a reliable distinguishing characteristic of multifractal spectra and hence as indicators of the presence of abnormal teletraffic activity.

Proceedings ArticleDOI
27 Oct 2011
TL;DR: This paper presents the result of analysis of mathematical models of Markov chain based speech packet sources vis-à-vis the peculiarities of telephone dialogue models, which can be employed in the design and development of methods of statistical multiplexing of packet switching network nodes.
Abstract: Existing methods of analysis of voice transmission by packet switching were designed mainly with respect to a Poisson stream of input packets, for which the probability of an active packet on each input port of the router is a constant value in time. This assumption is not always valid, since the formation of speech packets during a dialogue is a non-stationary process, in which case mathematical modeling becomes an effective method of analysis, through which necessary estimates of a network node being designed for packet transmission of speech may be obtained. This paper presents the result of analysis of mathematical models of Markov chain based speech packet sources vis-a-vis the peculiarities of telephone dialogue models. The derived models can be employed in the design and development of methods of statistical multiplexing of packet switching network nodes.