Publication

Publisher:
 Proceedings Of The World Congress On Engineering And Computer Science 2016 Vol I WCECS 2016, October 19-21, 2016, San Francisco, USA
Publication Type:
 Conference
Publication Title:
 Development Of A Prioritized Scheduling Algorithm For Congestion Management In Long Term Evolutio
Publication Authors:
 Kuboye B. M, Adewale O. S., Alowolodu O. D. And Damilola E. O.
Year Published:
 2019
Abstract:
These instructions give you guidelines for preparing pap The surfacing of a Long Term Evolution (LTE) in a mobile networks environment was welcomed by the public due to its promising high speed and capacity in both voice and internet services. The number of subscribers to this network continues to increase daily thereby giving rise to congestion on the scarce resources available for allocation to the subscribers. Scheduling is one of the methods that that can be employed to mitigate the congestion on the network; as a result, several scheduling algorithms on the management of Radio Blocks (RBs) in LTE Networks were studied. Thereafter, a new prioritized algorithm was designed and simulated using Simulink in MATLAB. The results were compared to Best CQI and Round Robin. The proposed algorithm showed promising statistics in comparison with the Best CQI and Round Robin algorithms in terms of throughput and resource block allocation fairness. 
Publisher:
 Issues In Informing Science And Information Technolog
Publication Type:
 Journal
Publication Title:
 MEDICAL IMAGE SECURITY USING QUANTUM CRYPTOGRAPHY
Publication Authors:
 Olufunso Dayo Alowolodu, Gabriel Kayode Adelaja, Boniface Kayode Alese, Olufunke Catherine Olayemi
Year Published:
 2018
Abstract:
Medical images are very sensitive data that can be transferred to medical laboratories, professionals, and specialist for referral cases or consultation. Strict security measures must be utilized to keep these data secured in computer networks when transferred to another party. On a daily basis, unauthorized users derive ways to gain access to sensitive patient medical information. 
Publisher:
  Interdisciplinary Journal Of Information, Knowledge, And Management, 13, 79-94.
Publication Type:
 Journal
Publication Title:
 MULTILEVEL AUTHENTICATION SYSTEM FOR STEMMING CRIME IN ONLINE BANKING
Publication Authors:
 Boniface Kayode Alese, Aderonke F. Thompson, Olufunso D. Alowolodu, Blessing Oladele
Year Published:
 2018
Abstract:
The wide use of online banking and technological advancement has attracted the interest of malicious and criminal users with a more sophisticated form of attacks. Therefore, banks need to adapt their security systems to effectively stem threats posed by imposters and hackers and to also provide higher security standards that assure customers of a secured environment to perform their financial transactions. The use of authentication techniques that include the mutual secure socket layer authentication embedded with some specific features. An approach was made through this paper towards providing a more reliable and complete solution for implementing multi-level user authentication in a banking environment. The use of soft token as the final stage of authentication provides ease of management with no additional hardware requirement. This work is an approach made towards providing a more reliable and complete solution for implementing multi-level user authentication in a banking environment to stem cybercrime. With this approach, a reliable system of authentication is being suggested to stem the growing rate of hacking activities in the information technology sector. 
Publisher:
 Proceedings Of The World Congress On Engineering And Computer Science 2016 Vol I WCECS
Publication Type:
 Conference
Publication Title:
 Sound Card As A Data Acquisition System, International Research Journal, Ado-Ekiti
Publication Authors:
 3. B. J. Olufeagba, K. E. Alowolodu And O. D. Alowolodu
Year Published:
 2016
Abstract:
Computing applications and data are growing so quickly that increasingly larger servers and disks are needed to process them fast enough within the required time period, which brought about the concept of Cloud Computing. Cloud Computing was introduced as a result of unfriendly environment created by Data Centers due to carbon emissions in addition to huge maintenance costs. Although, the major aim of the Cloud is for storage of data, attention has now shifted from that to the security of data in the Cloud. One of the ways by which data in the Cloud could be secured is cryptography. Elliptic Curve Cryptography which is a public key cryptographic scheme is employed in this work because of the smaller key size. This makes it suitable in a situation where resources like processing power, storage space, bandwidth and power consumption is limited. 
Publisher:
 Proceedings Of The World Congress On Engineering And Computer Science 2016 Vol I WCECS 2016, October 19-21, 2016, San Francisco, US
Publication Type:
 Conference
Publication Title:
 Secured Cloud Application Platform Using Elliptic Curve Cryptograph
Publication Authors:
 Alowolodu Olufunso Dayo, Alese Boniface Kayode, Adetunmbi Olusola Adebayo
Year Published:
 2016
Abstract:
These instructions give you guidelines for preparing pap The surfacing of a Long Term Evolution (LTE) in a mobile networks environment was welcomed by the public due to its promising high speed and capacity in both voice and internet services. The number of subscribers to this network continues to increase daily thereby giving rise to congestion on the scarce resources available for allocation to the subscribers. Scheduling is one of the methods that that can be employed to mitigate the congestion on the network; as a result, several scheduling algorithms on the management of Radio Blocks (RBs) in LTE Networks were studied. Thereafter, a new prioritized algorithm was designed and simulated using Simulink in MATLAB. The results were compared to Best CQI and Round Robin. The proposed algorithm showed promising statistics in comparison with the Best CQI and Round Robin algorithms in terms of throughput and resource block allocation fairness. 
Publisher:
 International Journal Of Computer Science And Information Security (IJCSIS)
Publication Type:
 Journal
Publication Title:
 PYTHAGOREAN TRIPLE BASED CRYPTOGRAPHY SYSTEM FOR INFORMATION SECURITY
Publication Authors:
 R. Adeoye, O. Adetan And O.D. Alowolodu
Year Published:
 2016
Abstract:
Information is compromised at a high rate as there is significant increase in the number of hackers or attackers. The aim of compromising information is to attack confidentiality, integrity and availability of the message. The paper implements the security of information using Pythagorean triple based cryptographic system which makes use of the new Pythagorean triple algorithm. This cryptographic system makes use of symmetric cryptography that only the sender and the receiver have in order to secure information. It makes use of a secret key P and Q where . The secret keys; are used in the Pythagorean triple cryptographic system to devise the solutions of the Pythagorean triple. The Java programming language has been chosen to perform the encryption and decryption of message in this work. The Pythagorean triple cryptographic system is a more secure cryptography system which prevents cryptanalytic and bruthforce attack to a large extent 
Publisher:
 EVO JOURNAL OF ENGINEERING AND TECHNOLOGY
Publication Type:
 Journal
Publication Title:
 An E-Record For Knowledge Repository (Project Bank)
Publication Authors:
 Alowolodu O.D , Adebayo O.T & Akintaro O.
Year Published:
 2015
Abstract:
Record keeping occupies a strategic position in the efficient and effective management environment. Thereis need for a repository where projects or works done can be kept. An electronic project library is the solution to easy access of information and a repository of knowledge. The project bank is a managerial database project that enables many users of a system: even those with little knowledge of information technology to benefit enormously from the information it contains. The project bank design will allow individuals, students and lecturers alike to include their own materials or take advantage of network based information and services it offers. 
Publisher:
 IJCA
Publication Type:
 Journal
Publication Title:
 Elliptic Curve Cryptography For Securing Cloud Computing Applications(IJCA),
Publication Authors:
 Alowolodu O.D, Alese B.K, Adetunmbi A.O, Adewale O.S, Ogundele O.S
Year Published:
 2013
Abstract:
Computing applications and data are growing so rapidly that increasingly larger servers and data centre are needed for fast processing within the required time. A fundamental shift in the way Information Technology (IT) and computing services are being delivered and purchased results in the development of cloud computing. The out of control cost of power in terms of electricity generation, personnel hardware and limited spaces in data centers have encouraged a significant number of enterprises to move more infrastructures into a third party provided Cloud. However, Cloud computing requires that organizations trust that a service provider’s platforms are secured and provide a sufficient level of integrity for the client’s data. Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. An important factor is the key strength, i.e. the difficulty in breaking the key and retrieving the plain text. In this paper, we proposed Elliptic Curve Cryptography scheme as a secure tool to model a Secured platform for the Cloud Application. 
Publisher:
 Nil
Publication Type:
 Journal
Publication Title:
 A Formal Approach To Modelling Delegation Policy Based On Subject Attributes And Role Hierarchy, International Journal Of Computing And ICT Research (IJCIR),
Publication Authors:
 2. Ogundele O.S., Alese B.K., Falaki S.O.,Alowolodu O.D. And Adewale O.S, (
Year Published:
 2011
Abstract:

nil

 
Publisher:
 Nil
Publication Type:
 Conference
Publication Title:
 Development Of An SMS - Based Outage Reporting System , 21st CIRED Conference In Frankfurt, Germany
Publication Authors:
 B. J. Olufeagba, K. E. Alowolodu, And O. D. Alowolodu
Year Published:
 2011
Abstract:

Traditional outage reporting in Nigeria is done by consumers visiting the service station of the electricity company and making reports of outages. This presents many problems such as inaccurate data management, slow response and uncoordinated outage management among others. Developed outage reporting system are based on fixed land lines and these are not very common in Nigeria. The Global System for Mobile (GSM) has over the past decade covered most of the country. A real-time outage reporting system based on the Short Message Service (SMS) feature of the GSM was developed and implemented. The solution is a GSM modem interfaced to a computer which would receive customer originated messages, process them and update a database and thus alert essential units in the organization for action in real time while providing the means of relatively accurate collection of data useful for planning and other functions. The software was developed with Microsoft C# and MapWindows which provided a means of overlaying the faults reported on a digital map of the coverage area. The system proved to provide a shorter mean time to repair of faults on the Akure distribution area.