Etinosa Noma‐Osaghae

ORCID: 0000-0003-4030-2321
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Biometric Identification and Security
  • User Authentication and Security Systems
  • Face and Expression Recognition
  • IoT and GPS-based Vehicle Safety Systems
  • IoT-based Smart Home Systems
  • Face recognition and analysis
  • Advanced MIMO Systems Optimization
  • Internet Traffic Analysis and Secure E-voting
  • Network Traffic and Congestion Control
  • Advanced Wireless Network Optimization
  • Wireless Communication Networks Research
  • Wireless Networks and Protocols
  • RFID technology advancements
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Wireless Communication Technologies
  • Traffic Prediction and Management Techniques
  • Power Line Communications and Noise
  • Autonomous Vehicle Technology and Safety
  • Indoor and Outdoor Localization Technologies
  • IoT and Edge/Fog Computing
  • Fire Detection and Safety Systems
  • Context-Aware Activity Recognition Systems
  • Mobile and Web Applications
  • Cloud Computing and Resource Management
  • Network Security and Intrusion Detection

Olabisi Onabanjo University
2024

Covenant University
2017-2022

Attendance taking is a standard practice in every educational system. The methods used to take class attendance are quite numerous but emphasis keeps shifting towards automating the process. use of biometrics fast gaining ground and traditional way losing especially when very large time great essence. iris was as biometric this paper. After enrolling all attendees by storing their particulars along with unique template, designed system automatically took capturing eye image each attendee,...

10.1109/csci.2017.96 article EN 2021 International Conference on Computational Science and Computational Intelligence (CSCI) 2017-12-01

Current biometric methods for attendance are too intrusive. This paper presents a stress-free non-intrusive way of taking class using face as the It also has added novelty relaying vital information about to handheld devices via any available cellular network. During enrollment, camera was used acquire facial images that were made into templates Fisherfaces algorithm. These stored in database. verification or taking, features extracted from acquired and picture compared Fisher Linear...

10.1109/nigercon.2017.8281895 article EN 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON) 2017-11-01

Over the years, security has soared in importance as concerned individuals, companies and organizations continue to implement measures improve of lives properties. Door-access control is a physical system that secures room or building by limiting access specific people keeping records such accesses. The significance iris technology among others, for applications are numerous. In terms security, already making inroads into market because reliability its authentication process. this paper,...

10.1109/csci.2017.102 article EN 2021 International Conference on Computational Science and Computational Intelligence (CSCI) 2017-12-01

Congestion stability and prevention is the main aim of any decent network traffic management scheme. The protocol that drives congestion control in IP networks, called Transmission Control Protocol (TCP), plagued by bandwidth underutilization when implemented on wireless networks. trunk queue size goal this paper, along with its antecedent delay issues Active Queue Management (AQM) algorithms overcomes issue faced TCP flows Two adaptive models, specifically built for were created. This made...

10.15866/irecap.v8i1.13408 article EN International Journal on Communications Antenna and Propagation (IRECAP) 2018-02-28

This paper demonstrates the robustness of active queue management techniques to varying load, link capacity and propagation delay in a wireless environment. The performances four standard controllers used Transmission Control Protocol/Active Queue Management (TCP/AQM) systems were compared. Fixed-Parameter Proportional Integral (PI), Random Early Detection (RED), Self-Tuning Regulator (STR) Model Predictive (MPC). congestion control algorithm each technique was documented by simulating...

10.11591/ijece.v9i1.pp359-368 article EN International Journal of Electrical and Computer Engineering (IJECE) 2019-02-01

Attendance records play a vital role in the educational sector. It is so that students are not allowed to sit for examinations if they do meet class attendance benchmark. But students, instead of making sure attend classes regularly, devise cunny ways committing fraud. This unpleasant trend has made it necessary develop systems can take accurate and minimize The use biometrics taking becoming quite popular. One such Face. In this paper, facial recognition algorithm known as Fisherfaces or...

10.1109/iccni.2017.8123776 article EN 2017-10-01

In spite of the significant advancement in face recognition expertise, accurately recognizing same individual across different ages still remains an open research question. Face aging causes intra-subject variations (such as geometric changes during childhood adolescence, wrinkles and saggy skin old age) which negatively affects accuracy systems. Over years, researchers have devised techniques to improve age invariant (AIFR) this paper, gesture network (FG-NET) dataset was adopted enable...

10.11591/eei.v10i1.2356 article EN Bulletin of Electrical Engineering and Informatics 2020-10-11

In most homes, electrical appliances are controlled and operated manually, this could be difficult challenging to do when tiredness, handicap, morphological variations (height, aging etc.) inadequate skill stands in the way as impediment. This study aims implement a better more flexible means of controlling home by an automated switching mechanism using speech recognition technique. Acoustic signals picked microphone application generate digital that passed microcontroller, which turn...

10.1109/iccni.2017.8123775 article EN 2017-10-01

A lot of attempts have been made to use biometrics in class attendance systems. Most the implemented biometrie systems are unimodal. Unimodal may be spoofed easily, leading a reduction recognition accuracy. This paper explores bimodal improve accuracy automated student The system uses face and fingerprint take students' attendance. faces were captured using webcam preprocessed by converting color images grey scale images. then normalized reduce noise. Principal Component Analysis (PCA)...

10.1109/nigercon.2017.8281916 article EN 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON) 2017-11-01

Encryption systems have been developed for image viewing applications using the Hill Cipher algorithm. This study aims to evaluate encryption quality of Several traditional metrics are used scheme. Three such selected this study. These include, Colour Histogram, Maximum Deviation (comparing original image) and Entropy Analysis encrypted image. results from all three schemes a variety images show that plain approach gives good result kinds but is more suited colour dense images.

10.12928/telkomnika.v17i6.10488 article EN cc-by-sa TELKOMNIKA (Telecommunication Computing Electronics and Control) 2019-12-01

Most web-based disease surveillance systems that give epidemic alerts are based on very large and unstructured data from various news sources, social media online queries parsed by complex algorithms. This has the tendency to generate results so diverse non-specific. When considered along with fact there no existing standards for mining analyzing internet, or decisions reached internet sources have been classified as low-quality. paper proposes a grassroots alert system is collected...

10.11591/ijece.v8i5.pp3809-3828 article EN cc-by-nc International Journal of Electrical and Computer Engineering (IJECE) 2018-10-01

Determining the channel characteristics and how it affects transmitted signals is known as estimation. MIMO OFDM a combination of techniques. In this paper, comparative studies MIMO, MISO SISO estimation, using was performed. The block type comb pilot arrangements were compared, also various interpolation techniques compared to determine optimum performance. Bit Error Rate MSE employed performance metrics. This research carried out by modeling simulating wireless communication system MATLAB....

10.15866/iremos.v11i3.13884 article EN International Review on Modelling and Simulations (IREMOS) 2018-06-30
Coming Soon ...