Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Daniel D A U D A Wisdom
  • danieldaudawisdom1@gmail.com
Cybercrimes in various forms are on the raise daily; these crimes pose a potential threat to our moral society as well as economy and nation building at large. They are namely: social engineering, malvertising, ransom ware, Spamming,... more
Cybercrimes in various forms are on the raise daily; these crimes pose a potential threat to our moral society as well as economy and nation building at large. They are namely: social engineering, malvertising, ransom ware, Spamming, Botnets, fake bank alert messages (SMS) /unsolicited SMS requesting you to provide bank details as Bank Verification Number (BVN), fraud, identity theft, piracy, pornography, hacking, fraudulent e-mail related SMS, forgery such as fake documents as Certificate etc. Thus, Cybercrime is gradually becoming a threat to our moral society at large. Hence, the increase number of cybercrime rate is an open field of ongoing research studies. Therefore, we have proposed a new approach that emphases on the prominent cybercrimes carried out around the world, and presents a precise study in Nigeria within some secondary school students. The study revealed a new approach to fighting Cybercrimes in order to combat cybercriminals. Keywords: Cybercrime, Botnets, Malvert...
Mathematical model for the transition dynamics and control of the novel coronavirus (COVID-19) in Nigeria has been proposed for incorporating the impact of vaccination and prevention. The endemic equilibrium state and the effective... more
Mathematical model for the transition dynamics and control of the novel coronavirus (COVID-19) in Nigeria has been proposed for incorporating the impact of vaccination and prevention. The endemic equilibrium state and the effective reproductive number (R0) was obtained and used to find the best recipe for curbing the rate of transmission of the disease. Using the Nigerian demographic data, numerical simulation results showed that 20% coronavirus vaccination when applied in coverage of active individuals is better than 75% preventive individual's usage on limiting the spread of COVID-19. In addition, the results also showed that vaccinating 30% of active individuals are better ways of curbing the disease than vaccinating 75% of individuals that are not infected with the virus as shown by the calculated ratio and the simulation results, respectively.
Choosing a suitable router buffer size is still a significant research problem. The small buffer used guarantees low packet delay but higher chances of packet loss. Similarly, larger buffer results in buffer bloat which causes a high... more
Choosing a suitable router buffer size is still a significant research problem. The small buffer used guarantees low packet delay but higher chances of packet loss. Similarly, larger buffer results in buffer bloat which causes a high delay in a network. Buffer bloat is a significant problem due to the high changing link characteristics of modern heterogeneous networks. The access links can have connections with speedy links (Gbps) with a small number of packet losses and also have a connection with a susceptible high packet loss with lowbandwidth links like wireless and last-mile connections. Hence, what may be thought to be a rational buffer size, might be flawed when link rates and delays fall below the minimum value. In this paper, extensive NS2 simulations of multi-flow traffic were run to obtain a better-suited buffer size that results in better average throughput and delays over the wired network without extra signaling and computation by the router. The results showed that having a buffer between five and ten packets gave the best average throughput with a low average delay at the congested router.
Information and Communication Technology, ICT have a direct impact on raising living standards and improving the quality of life of the poor. There is no doubt that countries that are making major progress in the area of wealth creation... more
Information and Communication Technology, ICT have a direct impact on raising living standards and improving the quality of life of the poor. There is no doubt that countries that are making major progress in the area of wealth creation are those in the fore-front of developing, deploying and exploiting ICT within their economy and society. Also, Entrepreneurship is increasingly being accepted as an important and innovative strategy for improving the livelihood and economic independence of young people.However, ICT is believed to help the youths develop varied skills including entrepreneurial skills. This paper examines the role of ICT and Telecommunication as an Entrepreneurship, Wealth Creation and Implication for the Girl Child in Selected Science Secondary Schools in Kebbi State. The study adopted a descriptive survey design. The sample for the study consisted of 1,200 female students from the six (6) Girls science secondary schools in Kebbi State. A Structured questionnaire was...
IEEE known as WiMAX supports wider coverage, higher bandwidth, and quality of service (QoS). 802.16e was introduced which made battery-life of Mobile Station (MS) a critical challenge Since MS are battery powered with an impose... more
IEEE known as WiMAX supports wider coverage, higher bandwidth, and quality of service (QoS). 802.16e was introduced which made battery-life of Mobile Station (MS) a critical challenge Since MS are battery powered with an impose rechargeable life. An Efficient Battery Lifetime Aware Power Saving Scheme was proposed to minimize frequent transition of MS to listening-wake mode in order-to reduce power consumption. However, it increases average response delay due to a longer sleep interval used. Thus, an efficient sleep window based power saving scheme (ESPSS) is proposed to reduce the response delay. The ESPSS introduces an average based sleep window to minimize the longer sleep interval. The scheme also proposed a modified minimum and maximum sleep interval to reduce the response delay. The ESPSS was evaluated using a discrete event simulator. The results showed that ESPSS achieves a superior performance compared to the existing Scheme in terms of response delay while improving QoS.
IEEE 802.16 Standard also known as worldwide interoperability for Microwave Access (WiMAX) is designed to support wider coverage, higher bandwidth, less cost of deployment with different traffic classes’ support for power savings. The... more
IEEE 802.16 Standard also known as worldwide interoperability for Microwave Access (WiMAX) is designed to support wider coverage, higher bandwidth, less cost of deployment with different traffic classes’ support for power savings. The IEEE added mobility characteristics which made batterylife of Mobile Station (MS) a critical challenge, since MS are battery powered with an impose rechargeable life. An Efficient Battery Lifetime Aware Power Saving Scheme was proposed. The Scheme minimizes frequent transition of MS in order-to reduce power consumption but increases average response delay due to a longer sleep interval used. Thus, a Delay Aware Power Saving Scheme (DAPSS) Based on Traffic Load is proposed to reduce the excessive response delay. The Scheme introduces a modified minimum and maximum sleep interval in order to reduce the longer sleep time of a MS, and dynamically tunes the sleep parameters more appropriately according to the traffic load. It employed a delay aware algorithm to save power. The Scheme was evaluated using discrete event simulator, the results showed that the proposed DAPSS achieves superior performance compared to the existing Scheme in terms of the average power consumption and response delay.
Experiments, for example, medical and social science surveys, conducted by human are often characterized by problem of non-response of missing observations. In this study, an alternative imputation method to Singh and Horn (2000) and... more
Experiments, for example, medical and social science surveys, conducted by human are often characterized by problem of non-response of missing observations. In this study, an alternative imputation method to Singh and Horn (2000) and Singh et al (2014) compromised imputation methods has been suggested due to decrease in their efficiency when the value of unknown weights tend to unity. The properties (bias and MSE) of the proposed estimators were derived up to first order approximation using Taylor series approach. Conditions for which the proposed estimator more efficient than other estimators considered in the study were also established. Numerical illustration was conducted and the results revealed that the proposed estimator is more efficient.
ABSTRACT Surface current velocity fields measured every 10 min by a high-frequency ocean radar system (HF radar) located at the southern Great Barrier Reef (GBR), Australia, were used to compute Lagrangian trajectories (radar-based... more
ABSTRACT Surface current velocity fields measured every 10 min by a high-frequency ocean radar system (HF radar) located at the southern Great Barrier Reef (GBR), Australia, were used to compute Lagrangian trajectories (radar-based trajectories). The radar-based trajectories were validated against surface-drogued satellite tracked drifting buoys released on the shelf inside the reef lagoon and on the continental slope. Current speeds estimated from the drifters were typically within 5% to 8% of the HF radar currents extracted at the exact position occupied by the drifters for each sampled time, but some large current velocity biases occurred over short periods of time in shallow areas. Maximum separation distances between the drifter and radar-based tracks ranged from 5 km to 14 km on the shelf and from 4 km to 35 km on the slope for 24 tracks tracked up to one week. The reduction of the predictability of the radar-based trajectories occurred mostly in the vicinity of the islands of the reef matrix, suggesting the influence of small scale processes in the drifter paths not seen at the HF radar spatial resolution. A filtering procedure was applied a posteriori to the u and v components of the current velocity vectors calculated from non-quality controlled radial data obtained from the IMOS archive. Interpolation was used to cover temporal gaps less than 3 h allowing radar-based trajectories to be followed for up to 7 days. The use of radial data reprocessed and quality controlled by the Australian Coastal Radar Network (ACORN) extended the tracking period up to 13 days, reprocessing allows retrieval of some information lost in the non-quality controlled radial data.
Corals, the foundation of tropical marine ecosystems, exist in a symbiotic relationship with zooxanthellae (algae). The corals obtain much of their energy by consuming compounds derived from photosynthesis by these microorganisms; the... more
Corals, the foundation of tropical marine ecosystems, exist in a symbiotic relationship with zooxanthellae (algae). The corals obtain much of their energy by consuming compounds derived from photosynthesis by these microorganisms; the microorganisms, which reside in the coral tissue, in turn use waste products from the corals to sustain photosynthesis. This symbiosis is very sensitive to subtle changes in environment, such as increased ocean acidity, temperature, and light. When unduly stressed, the colorful algae are expelled from the corals, causing the corals to “bleach” and potentially die [e.g., van Oppen and Lough, 2009].
The rapid evolution of technology, particularly the adoption of fifth-generation (5G) wireless networks, has introduced both unprecedented opportunities and challenges across various industries. Among these, the oil and gas sector plays a... more
The rapid evolution of technology, particularly the adoption of fifth-generation (5G) wireless networks, has introduced both unprecedented opportunities and challenges across various industries. Among these, the oil and gas sector plays a pivotal role in global economies and requires advanced measures to ensure the security of its critical infrastructure. This paper presents a comprehensive approach to address the security implications of integrating 5G networks into the oil and gas industry, with a specific focus on safeguarding operations through an Enhanced Cybersecurity Framework. In the proposed scheme, an extensive literature review was conducted to understand the potential impacts of 5G integration on the oil and gas industry's internet security. The review explored existing research, methodologies, and best practices in related fields, forming the foundation for the proposed framework. Drawing insights from this review, a multi-faceted algorithm, termed Secure 5G-Enabled Oil and Gas Infrastructure (S5G-OGI), was devised. The S5G-OGI algorithm outlines ten distinct steps encompassing risk assessment, adaptive access control, traffic analysis, data integrity using blockchain, encrypted communication, intrusion detection, SIEM integration, continuous monitoring, employee training, and regular security audits. To demonstrate the feasibility and practical implementation of the proposed algorithm, a Python programming language was utilized. A simplified version of the algorithm was translated into Python code, demonstrating how each step contributes to enhancing the security of the oil and gas industry's critical infrastructure. While the implemented code serves as an illustrative example, it highlights the essence of each algorithmic step and underscores the technical viability of the proposed framework. The proposed scheme underscores the critical importance of securing the oil and gas industry's critical infrastructure as it transitions to 5G networks. By amalgamating a comprehensive literature review, a thoughtfully designed algorithm, and practical implementation in Python, the Enhanced Cybersecurity Framework offers a roadmap to ensure the resilience, integrity, and security of operations within the evolving landscape of the 5G-integrated oil and gas industry. As technology continues to advance, proactive security measures will be essential to mitigate risks and fortify the foundation of this essential sector.
IEEE known as WiMAX supports wider coverage, higher bandwidth, and quality of service (QoS). 802.16e was introduced which made battery-life of Mobile Station (MS) a critical challenge Since MS are battery powered with an impose... more
IEEE known as WiMAX supports wider coverage, higher bandwidth, and quality of service (QoS). 802.16e was introduced which made battery-life of Mobile Station (MS) a critical challenge Since MS are battery powered with an impose rechargeable life. An Efficient Battery Lifetime Aware Power Saving Scheme was proposed to minimize frequent transition of MS to listening-wake mode in order-to reduce power consumption. However, it increases average response delay due to a longer sleep interval used. Thus, an efficient sleep window based power saving scheme (ESPSS) is proposed to reduce the response delay. The ESPSS introduces an average based sleep window to minimize the longer sleep interval. The scheme also proposed a modified minimum and maximum sleep interval to reduce the response delay. The ESPSS was evaluated using a discrete event simulator. The results showed that ESPSS achieves a superior performance compared to the existing Scheme in terms of response delay while improving QoS.
Research Interests: