Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
ABSTRACT Cloud computing in VANETs (CC-V) has been investigated into two major themes of research including vehicular cloud computing (VCC) and vehicle using cloud (VuC). VCC is the realization of autonomous cloud among vehicles to share... more
ABSTRACT
Cloud computing in VANETs (CC-V) has been investigated into two major themes of research
including vehicular cloud computing (VCC) and vehicle using cloud (VuC). VCC is the realization of
autonomous cloud among vehicles to share their abundant resources. VuC is the efficient usage
of conventional cloud by on-road vehicles via a reliable Internet connection. Recently, a number of
advancements have been made to address the issues and challenges in VCC and VuC. This paper
qualitatively reviews CC-V with the emphasis on layered architecture, network component,
taxonomy, and future challenges. Specifically, a four-layered architecture for CC-V is proposed
including perception, coordination, artificial intelligence and smart application layers. Three
network components of CC-V, namely, vehicle, connection, and computation are explored with
their cooperative roles. A taxonomy for CC-V is presented considering major themes of research in
the area including design of architecture, data dissemination, security, and applications. Related
literature on each theme is critically investigated with comparative assessment of recent advances.
Finally, some open research challenges are identified as future issues. The challenges are the
outcome of the critical and qualitative assessment of the literature on CC-V
—Vehicular Ad-hoc Networks (VANETs) has witnessed significant attention from academia and industries, due to the growing number of applications and devices focusing on safety and efficiency in transportation. Video Streaming in Vehicular... more
—Vehicular Ad-hoc Networks (VANETs) has witnessed significant attention from academia and industries, due to the growing number of applications and devices focusing on safety and efficiency in transportation. Video Streaming in Vehicular Communication (VSVC) presents interactive real-time view of an emergency incidence on roads. On-board unit of vehicles are utilized for streaming real time video of on road traffic, and disseminate among vehicles via Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. VSVC is a challenging task due to the delay constrained nature of video data and dynamic vehicular network environment. Some of the fundamental issues in video streaming include queueing delay, bandwidth underutilization, and intermittent connectivity. Various techniques have been suggested in literature to address the issues in video streaming. To this end, this paper presents a qualitative review on multipath video streaming focusing on vehicular communication. Specifically, review of different multipath approaches with their comparative assessment are presented. Major challenges in multipath video streaming are identified as future directions of research. The review would benefit researchers and practitioners, in terms of enhancing clarity in multipath video streaming literature and emphasizing the issues.
A B S T R A C T Multimedia oriented Internet of Things (IoT) enables pervasive and real-time communication of video, audio and image data among devices in an immediate surroundings. Today's vehicles have the capability of supporting real... more
A B S T R A C T Multimedia oriented Internet of Things (IoT) enables pervasive and real-time communication of video, audio and image data among devices in an immediate surroundings. Today's vehicles have the capability of supporting real time multimedia acquisition. Vehicles with high illuminating infrared cameras and customized sensors can communicate with other on-road devices using dedicated short-range communication (DSRC) and 5G enabled communication technologies. Real time incidence of both urban and highway vehicular traffic environment can be captured and transmitted using vehicle-to-vehicle and vehicle-to-infrastructure communication modes. Video streaming in vehicular IoT (VSV-IoT) environments is in growing stage with several challenges that need to be addressed ranging from limited resources in IoT devices, intermittent connection in vehicular networks, heterogeneous devices, dynamism and scalability in video encoding, bandwidth underutilization in video delivery, and attaining application-precise quality of service in video streaming. In this context, this paper presents a comprehensive review on video streaming in IoT environments focusing on vehicular communication perspective. Specifically, significance of video streaming in vehicular IoT environments is highlighted focusing on integration of vehicular communication with 5G enabled IoT technologies, and smart city oriented application areas for VSV-IoT. A taxonomy is presented for the classification of related literature on video streaming in vehicular network environments. Following the taxonomy, critical review of literature is performed focusing on major functional model, strengths and weaknesses. Metrics for video streaming in vehicular IoT environments are derived and comparatively analyzed in terms of their usage and evaluation capabilities. Open research challenges in VSV-IoT are identified as future directions of research in the area. The survey would benefit both IoT and vehicle industry practitioners and researchers, in terms of augmenting understanding of vehicular video streaming and its IoT related trends and issues.
Research Interests:
Online health systems have become more popular in recent years by means of incorporating modern computer and telecommunication technologies into health system and objectives to facilitate patient need. In this paper we develop a web-based... more
Online health systems have become more popular in recent years by means of incorporating modern computer and telecommunication technologies into health system and objectives to facilitate patient need. In this paper we develop a web-based application that will minimize all paper works and manual records keeping, therefore allowing doctors and staff ease in keeping track of patients medical record, reducing patient's waiting time and increasing the number of patients served and also we presents a study on the assessment of the acceptability of implementation of an online health system in Nigeria's health sector. The evaluation utilized questionnaires to collect information from doctors, Staff and users. The system is design using B/S structure and JSP technology which are frequently used in web-based applications, and discuss how to program in JSP to implement the system in detail, especially the method of database access and data storage in a typical online health system. Practices prove that our online health system works well which is fully automated, user-friendly, time effective, efficient and improved content.
Research Interests:
Semantic Search Engine (SSE) has been developed to improve Kumbotso Teacher Educator Journal (KUTEJ) search engine, the software architecture implement an applications in the Semantic Web, based on designs and implementation specified in... more
Semantic Search Engine (SSE) has been developed to improve Kumbotso Teacher Educator Journal (KUTEJ) search engine, the software architecture implement an applications in the Semantic Web, based on designs and implementation specified in the Semantic Search Method (SSM). This architecture relies heavily on the ontology that structure underlying data for the purpose of comprehensive and transportable machine understanding. Therefore, the success of the Semantic Web depends strongly on the proliferation of ontology. Ontology model has been used in defining the concept and the association about the SSM.
Research Interests:
This paper compares and contrast role based access control (RBAC) approaches in mangodb 2.4 and Informix Online Dynamic Server Version 7.2. We categorize RBAC features under two major areas. User role assignment and assigning privileges.... more
This paper compares and contrast role based access control (RBAC) approaches in mangodb 2.4 and Informix Online Dynamic Server Version 7.2. We categorize RBAC features under two major areas. User role assignment and assigning privileges. Many commercially successful access control systems for mainframes implement role for secondary administration for example, an operator role could access all resources but not change access permissions, a security officer role could access all resources but have no access e.t.c. my findings is that these products provide a sound basis for implementing the basic features of RBAC, although there are significant differences. In particular, Informix restricts users to a single active role at any time, while mangodb allow multiple roles to be activated simultaneously as per the user's selection. I. INTRODUCTION In computer systems security, role-based access control (RBAC) [1][2] is an approach to restricting systems access to authorized users. It is used by the majority of enterprises with more than 500 employees [3] and can implement mandatory access control (MAC) or discretionary access control (DAC) RBAC is sometimes referred to as role based security. In RBAC permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles permissions. This greatly simplifies management of permissions. Roles are created for the various job functions in an organization and users are assigned roles based on their responsibilities and qualifications. In DBMS, The RBAC model forms an integral component of the access control mechanism, and hence the RBAC model data is used for enforcing access control on the various resources (database objects) under the control of the DBMS product [4]. An application system developed using a DBMS can contain a large amount of data with highly differentiated access permissions for different users depending upon their function or role within the organization. Hence database management is a key area which needs mechanisms for management of authorization or privileges. In this paper, we analyze compare and contrast RBAC approaches implemented in mangodb 2.4 and Informix Online Dynamic Server Version 7.2. The RBAC features that are supported have been categorized under two broad areas as follows  User role assignment  Assignable privileges In comparing the features of this complex commercial software packages, it is not always possible to readily obtain the total set of all supported features from product manuals alone. However, it is possible to extract and compare the major differences in features from using the multiple manuals that come with the product this is the approach that has been adopted in this paper.
Research Interests:
An online integrated information system for Demography is a web-based application that provides inputs and outputs information support to admin/users in order to update their demographic information. Nigeria is the most populous country... more
An online integrated information system for Demography is a web-based application that provides inputs and outputs information support to admin/users in order to update their demographic information. Nigeria is the most populous country in Africa. The absence of virtually any reliable current demographic data has not prevented national and international bodies from generating estimates and projections of population and population growth in Nigeria. Papers and pens is the usual method use in sourcing demographic information which is time consuming and waste of resources. In view of the availability of new technologies, this paper mainly concentrates on improving the manual methods in adopting a Browser Server structure to design an online integrated information system for demography. MyEclipse was used as an integrated environment for development of web-base application and JSP, were served as the programming language. Microsoft SQL server (2005) served as a relational data base management application for handling the data used.
Research Interests:
Computer has become one of the most important tools in human life, in-fact it has become an integral part of human life, because of its relevance in learning, communication and information, multimedia, business and entertainments. Despite... more
Computer has become one of the most important tools in human life, in-fact it has become an integral part of human life, because of its relevance in learning, communication and information, multimedia, business and entertainments. Despite all its advantages it has posed some negative effects on humanity. This paper shows the survey conducted to actually unveil some possible effects that users of computer encountered, and the result analysis has shown a great significance in educational research and the study.
Research Interests:
Due to the advancement of malware which gains privileges to the operating system and drops a malicious code, and allowing unauthorized access to the target computer networks. One of this malware includes a Trojan horse which has access to... more
Due to the advancement of malware which gains privileges to the operating system and drops a malicious code, and allowing unauthorized access to the target computer networks. One of this malware includes a Trojan horse which has access to computer or network with the aid of a user, whether knowingly or unknowingly. This paper presents a frame work of detecting a Trojan horse in network environment (client/server) so as to tackle present kind of Trojan horses (BINGHE). The result of the experiment shows a great potential of the method in allowing the detection and analysing different behaviour and attack of Trojan horse malware in computer and client/server network.
Research Interests:
Today's integrated circuits (ICs) are vulnerable to hardware Trojans, which are malicious alterations to the circuit, either during design or fabrication. The interventions of human in production of Hardware resources have given room for... more
Today's integrated circuits (ICs) are vulnerable to hardware Trojans, which are malicious alterations to the circuit, either during design or fabrication. The interventions of human in production of Hardware resources have given room for possible modification of hardware components, so as to achieve some malicious aims. This modification help with possible loop holes in the hardware component for later attack. Due to the increase in popularity aim of attacks using embedded Trojan horse programs into chips, attacker are more likely to suppress them with malicious program, also notwithstanding the increase in disintegration of the design and manufacturing process of our microelectronic products (ICs), we should not only concern about inclusion of unplanned, undesirable hardware features (" bugs "), rather about inclusion of planned malicious hardware features: " Trojan Horses, " which act as spies or guerrillas. This paper presents a Model of the fundamental attacks and possible detection techniques of Hardware Trojan. The result of the research has shown a great significance in education and for further researches.
Research Interests:
A number of hospitals and medical centres are exploring applications of wireless sensor network (WSN) technology to a wide range of medical applications, including pre-hospital, and in-hospital emergency care, disaster response, and... more
A number of hospitals and medical centres are exploring applications of wireless sensor network (WSN) technology to a wide range of medical applications, including pre-hospital, and in-hospital emergency care, disaster response, and stroke patient rehabilitation. Current Healthcare Wireless Sensor Networks (HCWSN) research trends focus on patient, reliable communication, patient mobility, and energy-efficient routing, among others. The studies focus on different cluster-based routing protocols which are used in increasing energy efficiency of WSN for healthcare application and to point out important issues in cluster-based routing (CBR) protocol that guide to improve them in order to extend their application range. Today, WSNs are becoming popular and many routing protocols have been proposed in the literature with a focus on the hierarchical routing. This paper surveys the WSNs energy-efficient CBR techniques that are used for Healthcare Communication system. Recent advancement and limitations of previous studies were highlighted. The routing protocols are categorized according to their respective energy efficiency. We intend for researchers to quickly identify areas that require more attention and to propose a novel methodology for improving the effectiveness of existing protocols.
Research Interests:
ABSTRACT: Cloud Computing (CC) holds a new dawn of computing where multiple services are offered to the cloud users through internet. CC has a qualitative, flexible and cost effective delivery platform for providing services to IT users... more
ABSTRACT: Cloud Computing (CC) holds a new dawn of computing where multiple services are offered to
the cloud users through internet. CC has a qualitative, flexible and cost effective delivery platform for providing services to IT users with the aid of internet. Due to advent of CC, capabilities of Mobile devices’ system
has been improved. Mobiles devices can now depend on CC and information storage resources, to carryout
complex computational operations which includes multimedia, searching and data mining. Also when considering local cloud, computation service is provided by enhancing operation of mobile cloud which handles mobile devices as a service nodes for example sensing services and computation of task. The task that need to be
computed has to be offloaded to local or conventional cloud to ease battery power. The energy consumption
during offloading of task is highly significant. Hence, characterization of some of the recent research works on
battery energy in MCC are grouped into dynamic and non-dynamic energy-aware task offloading and a comparative analysis table are presented and finally open research issues are qualitatively discussed based on critical assessment of the literature
Research Interests: