scispace - formally typeset
A

Aderemi A. Atayero

Researcher at Covenant University

Publications -  192
Citations -  2170

Aderemi A. Atayero is an academic researcher from Covenant University. The author has contributed to research in topics: Path loss & Wireless network. The author has an hindex of 20, co-authored 189 publications receiving 1411 citations.

Papers
More filters

Smart Vehicular Traffic Management System using RFID Technology

TL;DR: An intelligent, cost-effective, and eco-friendly park management system for scalable traffic control using RFID and Solar photovoltaic technologies and a stable power supply with no threat to the ecosystem is developed.
Journal ArticleDOI

Gender disparity in admissions into tertiary institutions: Empirical evidence from Nigerian data (2010-2015).

TL;DR: Empirical data on yearly admissions into accredited tertiary institutions in Nigeria are extensively explored to reveal the existence of gender gaps in the national admission process and help national regulatory bodies and relevant stakeholders in policy formulation and decision making towards ensuring equal access to higher education in Nigeria.
Proceedings ArticleDOI

Design and deployment of hybrid-telemedicine applications

TL;DR: A hybrid design of applications using hypermedia database capable of harnessing the features of real-time and stored-and-forward deployed over a wireless Virtual Private Network for the participating centers and healthcare providers is proposed.

Massive MIMO Channel Characterization and Modeling: The Present and the Future

TL;DR: Giving consideration to the dynamic adaptation of the elevation angles which is not captured in 2D channel models will open up new possibilities for 3D beamforming which will introduce considerable performance gains for 5G network capacity enhancement.

A Framework for M-Commerce Implementation in Nigeria

TL;DR: Aranrcwork for M-commerce implementation is proposed for countries such as Nigeria, Romania and Indonesia where cases of online scam are alanning and core implementation consideration is proposed to guarantee high level security.