Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register. Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Imam-Fulani, Yusuf Olayinka"

Now showing 1 - 6 of 6
Results Per Page
Sort Options
  • Item
    Comparative Analysis of Discrete Cosine Transform and Discrete Wavelet Transform on Different Image Files
    (International Journal of Information Processing and Communication, 2018) Aliyu, Ishola Nasiru; Nwana, O. K.; Sikiru, Ismaeel Abiodun; Imam-Fulani, Yusuf Olayinka
    The process of reducing the quantity of data used in representing certain information content without excessively reducing the quality of the original data is known as compression. It is useful in reducing pre-compression and post compression sizes are considered. Experimentally, result shows that DWT classes: lossless and lossy. It is lossless, if no information is lostduring compression process. A compression is lossy if the reconstructed image or data is not exactly the same as the original. This paper (DCT) and Discrete Wavelet Transform (DWT) on images of differentsizes with differentfile formats - memory space and time for an informationto be transmitted. Data compression can be divided into two JPG, PNG, BMP usingMatlab. Important parameters such as compression ratio, compression efficiency, presents comparative analysis between two lossy compression algorithms –Discrete Cosine Transform performed excellently better than DCT with better compression ratio and higher saving percentage
  • Item
    Effects of Detection Threshold and Frame Size On Duty Cycle in GSM Bands
    (2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON), 2017-11) Sikiru, Ismaeel Abiodun; Faruk, N.; Popoola, S. I.; Imam-Fulani, Yusuf Olayinka; Oloyede, A. A.; Olawoyin, L. A.; Surajudeen-Bakinde, N. T.
    Explosion in the demand for mobile applications those obtained based on actual measurements of the noise floor overestimates the occupancy values across all bands while the GSM 900 and 1800 MHz bands in Ilorin, Nigeria to cover a though, the International Telecommunication Union (ITU)has are examined.Spectrum measurements were conducted in the optimum prediction, 5dB above the measured average noise level should be considered as detection threshold. Furthermore, it was ITU 10 dB was found to be too conservative. Therefore, for and services necessitates the efficient utilization of the limited acceptable threshold value. In this paper, the effects of energy detection threshold techniques on duty cycle in the GSM bands provided a benchmark of 10dB above the noise level as an found that the number of frames of the sensing data do not have analytical method of determining noise level (theoretical) and most appropriate threshold value is not yet clearly stated, bandwidth of 105 MHz. Experimental results based on radio spectrum. Determination of a suitable detection threshold the probability of false alarm or failure detection. However, the Inappropriate choice of the threshold value may either increase is an important aspect of spectrum occupancy measurement. (measured) were analyzed. Findings indicated that the MaxNoise significant effect on the duty cycle
  • Item
    Hybridization of OFDMand Physical Layer Techniques for Information Security in Wireless System
    (Sule Lamido University Journal of Science &Technology, 2023-03) Olawoyin, L. A.; Abdulrahman, M.; Faruk, N.; Oloyede, A. A.; Adeniran, T. C.; Imam-Fulani, Yusuf Olayinka; Lasisi, H. O.; Sikiru, Ismaeel Abiodun; Baba, B. A.
    Due to quest for high data rate, reliable and secure communication, this has motivated both wired and wireless network shown that for all the modulation schemes, the key rate increases with an increase in the reserved subcarrier bits. schemes are implemented in securing the information transfer between two legitimate parties. In the simulation, the techniques may not be acceptable for future decentralized networks due to their high complexity in implementation source data are encrypted by obfuscation with dummy data in between the encrypted data of which 52 subcarriers power, and allocation of bits among different users. Traditionally, securing data in wireless system is always at the and computation. In this work, an OFDM IEEE 802.11a wireless system is used and physical layer encryption (PLE) frequency division multiplexing(OFDM) enablesreliable transmission of various data traffic by optimizing subcarrier, conducted for four different modulation techniques i.e.,BPSK, QPSK, 16 QAM, and 64 QAM. The result obtained were considered of which 25 subcarriers are reserved for dummy data and 27 were for data. The simulation was access service providers to deploy a next-generation network with ability to meet the required need. The use orthogonal upper layer of open system interconnection(OSI) Model by using data encryption techniques. However, such Also,the security level increased when substantial percentages of the subcarriers are reserved for dummy data.
  • Item
    PERFORMANCE ANALYSIS OF EMPIRICAL PROPAGATION MODELS FOR FIXED WIRELESS APPLICATION
    (Faculty of Communication and Information Sciences, University of Ilorin, Nigeria, 2018) Adebowale, Quadri R.; Imam-Fulani, Yusuf Olayinka; Sikiru, Ismaeel Abiodun; Sowande, Olugbenga A.; Adeniran, Caroline T.; Onidare, Samuel O.
    In this study, an efficacy assessment was carried out on 5 most widely used empirical propagation model has the lowest predicted path loss (150 dB to 153 dB) in an urban environment at 3.5 GHz. 3.5 GHz with a transmitter height of 30 m and varying distance from 250 m to 10 km. Three dB and 162 dB respectively in urban environment while the SUI model revealed the least suburban environment. Simulations were carried out at two different frequencies of 2.5 GHz and models by using MATLAB simulator to compare these models for FWA in both urban and COST 231 Hata indicated the highest predicted path loss at 10 m and 6 m with predictions of 160 that, Ericsson model has the least prediction of 145 dB to 147 dB at 10 m and 6 m receivers’ variation of propagation loss of 136 dB to 138 dB. Similarly, the study revealed that Ericsson The study concluded that no specific model predicted the least path loss for both urban and antenna height respectively, operating on 2.5 GHz frequency in urban environment. Apparently, different receiver antenna heights of 3 m, 6 m, & 10 m were considered. The results indicated suburban environment with the varying receiver antenna heights.
  • Item
    Physical layer security using boundary technique for emerging wireless communication systems
    (Wiley, 2022-11-04) Sikiru, Ismaeel Abiodun; Olawoyin, L. A.; Faruk, N.; Oloyede, A. A.; Abdulkarim, A.; Imam-Fulani, Yusuf Olayinka; Sowande, O. A.; Garba, S.; Imoize, A. L.
    Thebroadcastnatureofradiopropagationinwirelesscommunicationhasbeen aretheoretical,andafewareenhancedforefficientsecurityagainstanintruder. (eavesdroppers).Thephysicallayersecuritytechniquesoperateatthelowest deployedtosafeguardagainstsophisticatedattacks.Mostofthesedeployments Inthisarticle,aboundarytechniqueapproachisproposedandappliedtothe physicallayertoimproveitssecrecy-capacityandsubdueadversaryeffectsat probability,secrecy-capacity,andintercept-probabilityshowthatourproposed Carlosimulationwasperformed.Theresultobtainedusingsecrecyoutage theupperlayer.However,techniquessuchaschannelcoding,power(directional legitimatereceiver.Thesimulationresultswerecomparedwiththeanalytical receiverhasabettersignaltonoiseratiothanthecorrespondingeavesdropper’s methods.Itwasfoundthatthechannelbetweenthetransmitterandthemain antennaandartificialnoise),andspreadspectrumhavebeen(andcontinuously) stackofOSIlayeragainstconventionalcryptographicapproaches,operatingat suspectedastheloopholesofpassiveoractiveattacksbyunauthorizedusers thelegitimatereceiver.Hybridperformancemetricswereadopted,andaMonte channel.Conclusively,performanceoftheproposedtechniqueisvalidatedfor techniquesenhancethesecrettransmissionbetweenthemaintransmitterand applicationsinemergingwirelesscommunicationsystems.
  • Item
    Spatial Variability Study of Duty Cycle in GSM 900 and 1800 MHz Bands in Rural and Urban Environments
    (Indonesian Journal of Electrical Engineering and Informatics (IJEEI), 2019) Faruk, N.; Imam-Fulani, Yusuf Olayinka; Sikiru, Ismaeel Abiodun; Oloyede, A. A.; Adebowale, Quadri R.; Olawoyin, L. A.; Abdulkarim, A.; Adediran, Y. A.
    This paper examines the spatial variability of duty cycle in the GSM 900 and high negative correlations exits between urban 900 and rural 1800, and urban the regulatory bottlenecks to maximize the scarce radio resources in the 1800 MHz bands within Kwara State, Nigeria. The results show spatial abundance of unutilised spectrum within the GSM bands. Therefore, 1800 and rural 1800. There is a weak and negative correlation between rural variance in the duty cycle with average occupancies of 1.67%, 17.76%, and urban 900 MHz, rural-urban 1800. These results clearly show the correlation between rural 900/1800 MHz and urban 900/1800 MHz. But very 900 and 1800 MHz bands. Findings also show that there is very high positive 10.55% and 0.39%, 11.00% and 5.11 in therural, urban and all locations for regulatory commissions should adopt flexible spectrum reuse strategy to relax licensed bands, especially for rural network deployments

University of Ilorin Library © 2024, All Right Reserved

  • Cookie settings
  • Send Feedback
  • with ❤ from dspace.ng