Inventory is a list of items such as property or goods in stock, as organisation grows problems a... more Inventory is a list of items such as property or goods in stock, as organisation grows problems also rises as varieties of items are needed to be maintained in the inventory which makes it difficult for managers of inventory to track stocks. Formal way of keeping record has to evolve as quantities in inventory grew. Advancement in mobile technology has created opportunity to respond to the needs of modern society. In this paper, we developed a mobile-based inventory management system implementable in a cross-platform environment.<br> Waterfall process model was the design methodology for the application. Flutter was used to develop the cross-platform functionality while Firebase was the backend. The users responsible for inventory management are able to act on the go whenever the needs arise.
Superior network Quality of Experience (QoE) is important for Mobile Network Operators (MNO) as i... more Superior network Quality of Experience (QoE) is important for Mobile Network Operators (MNO) as it ensures they increase profit margins, attract new customers and differentiate themselves from the competition by providing better quality guarantees. In this paper, we propose a QoE hexagram model that comprises six Key Quality Indicators (KQI). In this model, we introduced an additional KQI, Terminal Quality. Other new metrics like Packet Corruption Rate and Service Access Time were also incorporated. Furthermore, several experiments were conducted by introducing disturbances using the NetEm tool. The QoE value obtained from our model is an indication of the overall acceptability of the applications and services as perceived subjectively by the end users.
Evaluational Study Of A Self Organizing Network (SON) And A GSM Congestion Monitoring System (CMS)
As the number of subscriber increases in the Global System for Mobile communication (GSM) heterog... more As the number of subscriber increases in the Global System for Mobile communication (GSM) heterogeneous networks, the exponential growth in mobile wireless networks traffic stress the need for a congestion Monitoring system (CMS) for the network to sustain high resources in the Quality of Service (QoS) and Quality of Experience (QoE). It is therefore necessary to note that if congestion in a network is not isolated then there will be an inevitable crash of the network. In this work, KPI of Self-Organized Network (SON) is critically reviewed, a congestion monitoring system for GSM was designed to illustrate the number of calls the system receives per day and this is recorded on daily bases to ascertain the level of congestion. The paper proposed and designed a system that monitors congestion in a network as a mean of network sustenance and also looked at SON as an optimization technique.
International Journal of Computer Applications Technology and Research, 2019
Wireless sensors are nowadays engaged in almost every human endeavour and has made live more conv... more Wireless sensors are nowadays engaged in almost every human endeavour and has made live more convenient and conducive. Human Computer interaction (HCI), which is about communication between human user and computer system or devices is a field of computer science that is gaining a lot of recognition in the improvement of human abilities. The communication between a person or user and the computer may involve certain device, medium or channel that has to be configured or programmed in a way that will facilitate an efficient interaction. Wireless sensors in HCI enhances and improves the way of life and the interaction in a wide variety of domains Therefore, it is important to know the specifications of these sensors and how they are being used in order to create human computer interfaces, which tackle complex tasks. This paper comprehensively carried out an overview of wireless sensors and HCI, security requirements and challenges of wireless sensors and how wireless sensors interrelate with HCI to improve human abilities in their daily activities. Finally, a brief discussion on the future of sensors in HCI is presented.
International Journal of Advanced Computer Science and Applications, 2013
Software Ecosystem (SECO) is a new and rapidly evolving phenomenon in the field of software engin... more Software Ecosystem (SECO) is a new and rapidly evolving phenomenon in the field of software engineering. It is an approach through which many variables can resolve complex relationships among companies in the software industry. SECOs are gaining importance with the advent of the Google Android, Apple iOS, Microsoft and Salesforce.com ecosystems. It is a coinnovation approach by developers, software organisations, and third parties that share common interest in the development of the software technology. There are limited researches that have been done on SECOs hence researchers and practitioners are still eager to elucidate this concept. A systematic study was undertaken to present a review of software ecosystems to address the features, benefits and challenges of SECOs. This paper showed that open source development model and innovative process development were key features of SECOs and the main challenges of SECOs were security, evolution management and infrastructure tools for fostering interaction. Finally SECOs fostered co-innovation, increased attractiveness for new players and decreased costs
In this paper, we consider resource allocation under the scheduled traffic model, where the setup... more In this paper, we consider resource allocation under the scheduled traffic model, where the setup and teardown times of scheduled demands are known in advance. A number of integer linear program (ILP) solutions for this problem have been presented in the literature. Most of these ILPs minimize the number of wavelength links. A more appropriate metric, for wavelength routed, all-optical networks, is to minimize the congestion (the maximum number of lightpaths on a single fiber link) of the network. We present a new ILP formulation for routing and wavelength allocation, under the scheduled traffic model that minimizes the congestion of the network. We propose two levels of service, where idle backup resources can be used to carry low-priority traffic, under fault-free conditions. When a fault occurs, and resources for a backup path need to be reclaimed, any low-priority traffic on the affected channels is dropped. The results demonstrate that this can lead to significant improvements over single service level models. We also show that the complexity of our formulation (in terms of the number of integer variables) is lower, even compared to existing approaches, which only allow a single level of service. Therefore, we are able to generate optimal solutions for practical networks within a reasonable amount of time, whereas existing formulations often do not find the optimal solution even after 2 h. Finally, we present a simple and fast heuristic that can quickly generate good solutions for much larger networks.
Hostel management system is an advanced system that makes organizing the affairs of the hostel qu... more Hostel management system is an advanced system that makes organizing the affairs of the hostel quicker, simpler, and more efficient. The normal procedure of allocating hostels at Babcock University involves selecting the preferred hostel online via the UMIS (University management information system) portal while the procedure for selecting rooms involves students showing up physically in school with their evidence of school fees payment. Due to these, it is undeniable that it is extremely time-consuming with an unreliable method of storing relevant documents and requires a lot of human resources. This proposed hostel management system is a web application developed using C# programming language. This application includes a module that finds missing items, a module for hostel registration and also a module for giving feedback. In conclusion the model has made managing the affairs of the hostel easy.
Introduction We have in our recent work (Awodele, Idowu, Anjorin, Adedire, & Apkore, 2009) discus... more Introduction We have in our recent work (Awodele, Idowu, Anjorin, Adedire, & Apkore, 2009) discussed the use of social tools, particularly in e-learning systems. In that work we suggested and discussed a model that provides the basis for the development of an enhancement system. We also analysed the trend of e-learning systems in developing countries, and also discussed the social approach to learning. While e-learning is widely used in learning institutions, its use has been profound in the business environment. Presently, we focus on adapting our model and implementing it for a university environment. According to Awodele et al. (2009), we suggested that to effectively impact the learning pattern of higher institutions, especially in Nigeria and other developing countries, the application of ICT should not be focused only on administrative issues like online registration, payment etc but the primary objective of the institution, which is learning should be made more effective and ...
A survey on security and privacy issues in the use of wireless sensor networks for health care monitoring
Development in wireless sensor Networks (WSNs) has led to the increase in its applications in hea... more Development in wireless sensor Networks (WSNs) has led to the increase in its applications in healthcare. Wireless Sensor Network application in health care is divided into two (2) wearable and implantable sensor devices. These devices allows for the monitoring and tracking of patients’ health status. Security and privacy are issues that arise from the use of these applications. The use of sensor networks for healthcare monitoring has a lot of benefits; so therefore, it is of necessity that these issues are addressed. This paper gives a survey on the security and privacy issues faced with the use of WSNs for healthcare monitoring.
E-learning systems have evolved from basic instructional tools to sophisticated systems capable o... more E-learning systems have evolved from basic instructional tools to sophisticated systems capable of providing robust virtual learning environment, where students can benefit from long distance courses with learning experience comparable to physical classroom courses. However, while e-learning systems are experiencing a proliferated development and adoption by schools in both developed and undeveloped economy, in most cases, there still exist a gap between the e-learning application and other non-academic services and community within the institution. This paper explains the development, implementation and use of an extended e-learning system named i-Converge that uses a social networking approach to enhance activities in a university. The system is built on a model that attempts to integrate several entities within the academic institution with a view to providing a holistic, and comprehensive learning system where information exchange is simplified and enhanced between all stakeholders in the institution. The system although implemented for use in a university will be further extended and implemented for use in any institution.
Ignoring security threats can have serious conseque nces; therefore host machines in network must... more Ignoring security threats can have serious conseque nces; therefore host machines in network must continually be monitored for intrusions since they are the final endpoint of any network. As a result, this paper presents an Intelligent Int rusion Detection and Prevention System (IIDPS), which monitors a single host system from three diff erent layers; files analyzer, system resource and connection
The Internet world as we know it today has undergone far-reaching changes since its early days wh... more The Internet world as we know it today has undergone far-reaching changes since its early days while becoming a critical communications underpinning our economic performance and social welfare. The 3D Internet is poised to replace the 2D Internet as we know it today. This paper takes a look at the two types of Internet, advantages and disadvantages and the future of the present Internet as we know it.
International Journal of Advanced Computer Science and Applications
The volume of Internet video traffic which consists of downloaded or streamed video from the Inte... more The volume of Internet video traffic which consists of downloaded or streamed video from the Internet is projected to increase from 42,029PB monthly in 2016 to 159,161PB monthly, in 2021, representing a 31% increase in the Compound Annual Growth Rate (CAGR). The market for mobile network operators is unpredictable, fast-paced and very competitive. End users now have more options when choosing service providers. With superior network Quality of Experience (QoE), service providers can increase margins by charging more for better quality. Packet corruption occurs when the receiver cannot correctly decode transmitted bits. This study identified the threshold at which the QoE of video streaming services became unacceptable due to the effect of packet corruption. In this paper, several experiments were carried out on video streaming services, creating disturbances to evaluate the user satisfaction level using the mean opinion scores. Network Emulator (NetEm) tool was used to create the packet corruption experienced during the video sessions and the QoE for different packet corruption percentages was established. From the experiments conducted, we found that user QoE decreased as the Packet Corruption Ratio (PCR) increased. With knowledge of the effect of the PCR, service providers can ensure that the PCR is kept within acceptable limits from end-to-end and this will ultimately lead to superior QoE from end users, which will in turn translate to improved subscriber base and profitability.
Issues in Informing Science and Information Technology
E-learning systems have evolved from basic instructional tools to sophisticated systems capable o... more E-learning systems have evolved from basic instructional tools to sophisticated systems capable of providing robust virtual learning environment, where students can benefit from long distance courses with learning experience comparable to physical classroom courses. However, while e-learning systems are experiencing a proliferated development and adoption by schools in both developed and undeveloped economy, in most cases, there still exist a gap between the e-learning application and other non-academic services and community within the institution. This paper explains the development, implementation and use of an extended e-learning system named i-Converge that uses a social networking approach to enhance activities in a university. The system is built on a model that attempts to integrate several entities within the academic institution with a view to providing a holistic, and comprehensive learning system where information exchange is simplified and enhanced between all stakeholders in the institution. The system although implemented for use in a university will be further extended and implemented for use in any institution.
Issues in Informing Science and Information Technology
Ignoring security threats can have serious consequences; therefore host machines in network must ... more Ignoring security threats can have serious consequences; therefore host machines in network must continually be monitored for intrusions since they are the final endpoint of any network. As a result, this paper presents an Intelligent Intrusion Detection and Prevention System (IIDPS), which monitors a single host system from three different layers; files analyzer, system resource and connection layers. The approach introduced, a multi-layered approach, in which each layer harnesses both aspects of existing approach, signature and anomaly approaches, to achieve a better detection and prevention capabilities. The design of IIDPS consist of three basic components; the iExecutive which is an agent that runs in the background, iBaseline which is a database that stores the signatures of intrusions and the iManager which is a user Interface that serves as an intermediary between the IIDPS and the user. This work serves as a foundation upon which interested researchers can further build on to achieve better detection and prevention capabilities.
International Journal of Information Technology and Computer Science
Health Informatics (HI) has played vital roles in the management of several diseases especially i... more Health Informatics (HI) has played vital roles in the management of several diseases especially in the tropics. It has revolutionized the mainstream healthcare and healthcare delivery system. This paper applies the principle of Health Informatics to addressing the detection and management of arboviruses particularly Zika and Dengue viruses around which the aetiology of Zika Virus Disease and Dengue fever revolves. In this paper, the object-oriented approach was employed to study the fundamental procedures in the detection and management of arboviral infections. The study culminated into modelling of knowledge-based prototype system for screening patients in incidence areas. Existing knowledge on the management of arbovirus infections was complemented with purposive sampling of two specialist infectious diseases facilities in Nigeria. The health informatics prototype is christened NCliniSoft Diagnostic ZikaSol and is composed of five components validated through expert-driven differential diagnostic procedures. The prototype was evaluated to test for usability, diagnostic consistency, user acceptance and satisfaction. The prototype performs a differential screening between Dengue fever and Zika Virus disease using the Bayesian probabilities complemented by situational constructs. The result of each screening process is an automated diagnostic report that shows the status of the patient. Computed result showed high level of efficiency and acceptability.
Uploads
Papers by Jonah Joshua