Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where S. N. John is active.

Publication


Featured researches published by S. N. John.


International Journal of Computer Applications | 2010

Developed Algorithm for Increasing the Efficiency of Data Exchange in a Computer Network

S. N. John; A A Anoprienko; R. E. Okonigene

This paper presents specialized means to analyze, model and research of data exchange in large-scale corporate computer network. Due to extreme complexity of corporate intranet networks and the internet has resulted in the apparent difficulties in the development of an analytical model. Thus, under these circumstances, simulation models became viable alternative to comprehend the behavior of these complex networks during data exchange. This research work examined the mode of data exchange since its perfection allows in many cases to obtain a considerable improvement of the network and also the network application performance without substantial additional expenditure. Hence, the need for this developed algorithm for increasing the efficiency of data exchange in a computer network and the appropriate topology that suite this case. Test results from the algorithm showed an average of 10 to 15% increase and occasionally 60% and above increase in data exchange efficiency without additional expenses.


Archive | 2018

An Improved Iris Segmentation Technique Using Circular Hough Transform

Kennedy O. Okokpujie; Etinosa Noma-Osaghae; S. N. John; Akachukwu Ajulibe

It is quite easy to spoof an automated iris recognition system using fake iris such as paper print and artificial lens. False Rejection Rate (FRR) and False Acceptance Rate (FAR) of a specific approach can be as a result of noise introduced in the segmentation process. Special attention has not been paid to a modified system in which a more accurate segmentation process is applied to an already existing efficient algorithm thereby increasing the overall reliability and accuracy of iris recognition. In this work an improvement of the already existing wavelet packet decomposition for iris recognition with a Correct Classification Rate (CCR) of 98.375% is proposed. It involves changing the segmentation technique used for this implementation from the integro-differential operator approach (John Daugman’s model) to the Hough transform (Wilde’s model). This research extensively compared the two segmentation techniques to show which is better in the implementation of the wavelet packet decomposition. Implementation of the integro-differential approach to segmentation showed an accuracy of 91.39% while the Hough Transform approach showed an accuracy of 93.06%. This result indicates that the integration of the Hough Transform into any open source iris recognition module can offer as much as a 1.67% improved accuracy due to improvement in its preprocessing stage. The improved iris segmentation technique using Hough Transform has an overall CCR of 100%.


Archive | 2018

Comparative Analysis of Fingerprint Preprocessing Algorithms for Electronic Voting Processes

Kennedy O. Okokpujie; Noma-Osaghae Etinosa; S. N. John; Etta Joy

Fingerprints have been used for a long time as a very adequate method of distinguishing people. Matching fingerprints can be very difficult without a good algorithm for the scanners. Complexities especially during the verification phase can arise from problems with the algorithm scanners use. In elections and other forms of voting, security and proof of individuality remain some of the biggest obstacles to be surmounted. This paper proposes an ideal algorithm which could solve these challenges. The Zhan-Suen Thinning Algorithm and the Guo-Hall Parallel Thinning Algorithm were compared using standard parameters from the perspective of fingerprint technology and electoral requirements to deduce the better algorithm. MATLAB® was used for the comparative performance analysis of the two algorithms. The time taken to complete iterations, quality of output produced and reliability were the parameters used to carry out the comparative performance analysis of the two algorithms. The better algorithm, Guo-Hall’s was recommended for implementation on e-voting systems. Guo-Hall’s algorithm is very effective and has the capacity to curb electoral fraud when adopted in e-voting process.


2017 International Conference on Computing Networking and Informatics (ICCNI) | 2017

Automatic home appliance switching using speech recognition software and embedded system

Kennedy O. Okokpujie; Etinosa Noma-Osaghae; S. N. John; Prince C. Jumbo

In most homes, electrical appliances are controlled and operated manually, this could be difficult and challenging to do when tiredness, handicap, morphological variations (height, aging etc.) and inadequate skill stands in the way as impediment. This study aims to implement a better and more flexible means of controlling home appliances by means of an automated switching mechanism using speech recognition technique. Acoustic signals picked by a microphone controlled by a speech recognition application generate digital signals that are passed to a microcontroller, which in turn dispatches commands that operate the relays to which the appliances in the home are connected. The goal of using speech command to automate the switching of home appliances was achieved and proved to be a more convenient means of switching home appliances.


2017 International Conference on Computing Networking and Informatics (ICCNI) | 2017

Development of a facial recognition system with email identification message relay mechanism

Kennedy O. Okokpujie; Etinosa Noma-Osaghae; S. N. John; Rhema Oputa

Attendance records play a vital role in the educational sector. It is so vital that students are not allowed to sit for examinations if they do not meet the class attendance benchmark. But students, instead of making sure they attend classes regularly, devise cunny ways of committing attendance fraud. This unpleasant trend has made it necessary to develop systems that can take accurate class attendance records and minimize fraud. The use of biometrics to develop attendance taking systems is becoming quite popular. One of such biometrics is The Face. In this paper, a facial recognition algorithm known as Fisherfaces or Fisher Discriminant Analysis (FDA) which is not sensitive to substantial variation in facial look and illumination is used to develop the facial recognition attendance taking system. The system implemented has a training database of Ten (10) students. Ten (10) facial images of each student are taken with different composures, looks and under different levels of illumination. Tests on nine (9) students in the database yielded accuracies of as low as 70% and as high as 90%. This validates the proof that the more the number of training facial image in the database, the higher the accuracy of Fisherfaces approach. The simple mail transfer protocol (SMTP) was interfaced with the database to send identification messages (name of student identified with time and date of identification) to the email address of the administrator (in this case the lecturer) in real-time to effectively monitor the attendance. The result was found capable of eliminating attendance fraud.


2016 SAI Computing Conference (SAI) | 2016

Improving Prioritized Handover Performance for Mobile WiMAX by Dynamic Guard Channel Allocation and RSS Quality Factor

Adeyinka A. Adewale; Emmanuel R. Adagunodo; S. N. John

In cellular communication, guard channel has been used to provide priority to ongoing call traffic crossing cell boundaries in handover process but the major concern is that most guard channel allocation scheme are fixed channels. System congestion problems arising from traffic pattern in the real world is another major concern relating to fixed allocation of guard channels let alone the huge traffic that will emanate from user mobility in the envisaged converged traffic of 4G networks. Hence, dynamic guard channel (DGC) allocation based on traffic intensity or channel utilization of each traffic type was used in this research and it reduced the new call blocking probability better than the fixed prioritized guard channel (PGC) and non-prioritized channel allocation scheme. Its performance in terms of call dropping probability reduction is comparable with the PGC and slightly better off at poor signal condition. It was revealed that DGC averaged QoS better than the existing channel assignment schemes. An investigation into the RSS quality factor (QF) proposed also, showed that at high quality RSS the blocking and dropping probability of the traffic were reduced for the Mobile WiMAX wireless technology network with mobile assisted handover.


international conference on information science and applications | 2018

Integration of Iris Biometrics in Automated Teller Machines for Enhanced User Authentication

Kennedy O. Okokpujie; Etinosa Noma-Osaghae; Olatunji Okesola; Osemwegie Omoruyi; Chinonso Okereke; S. N. John; Imhade P. Okokpujie

The ubiquitous Automatic Teller Machine that revolutionized the way monetary transactions are carried out the world over is currently riddled with several security challenges. Top on the list of these challenges are the thefts and frauds associated with the ever popular Personal Identification Number based automatic teller machines. A lot of suggestions and proposals have been made in recent times, on how to combat the menace of automatic teller machine frauds. Biometrics is one of the most promising tools that have the capacity to put the nefarious activities around automatic teller machines in check. This paper proposes a cheap and economic iris biometric based automatic teller machine, built around a microcontroller, iris scanner and a robust database. The designed and implemented prototype is capable of checkmating automatic teller machine fraud and it is also easy to implement in developing nations.


international conference on information science and applications | 2018

Fingerprint Biometric Authentication Based Point of Sale Terminal

Kennedy O. Okokpujie; Etinosa Noma-Osaghae; Olatunji Okesola; Osemwegie Omoruyi; Chinonso Okereke; S. N. John; Imhade P. Okokpujie

Retail businesses that are not transacted online still represent a substantial amount of retail deals that are closed on a daily basis. Retail business owners and customers continue to explore other means of ensuring payments made with Point of Sale (POS) devices are done securely. This paper proposes the incorporation of fingerprint biometric recognition as an additional layer of protection to the customary pin and password requirements to gain permission to pay for goods purchased and services rendered using point of sale devices. The proposed fingerprint biometric recognition point of sale device has zero false match and false non-match rate. This strengthens the present authentication process that makes use of pins and passwords that are prone to fraud and solidifies the trust and confidence users place on point of sale devices.


Cogent engineering | 2018

NomadicBTS: Evolving cellular communication networks with software-defined radio architecture and open-source technologies

Emmanuel Adetiba; V. O. Matthews; S. N. John; Segun I. Popoola; Abdultaofeek Abayomi

Abstract Utilization of software-defined radio (SDR) and open-source technologies in the next evolution of cellular communication networks may significantly reduce the capital expenditure (CAPEX) and operating expenditure (OPEX) of mobile network operators in emerging economies. In this paper, a novel cellular communication architecture named NomadicBTS was proposed, designed, and prototyped based on SDR paradigm to achieve an efficient, dynamic, and cost-effective wireless communication. The architecture comprises of hardware front-end and software that are compatible with general-purpose processor. Open-source technologies were adopted to implement a proof-of-concept architype of the architecture. A prototype femtocell (of approximately 7.54-m cell radius) was set up and two different commercially available smart phones were used to scan, detect, and measure the strength and quality of radio signals that were transmitted by the NomadicBTS prototype. Experimentation results showed that the network signal is visible to the smart phones, and its strength and quality are sufficient for good transmission and reception of Short Messaging Services (SMS). Unlike the conventional cellular networks which are capital-intensive, the results obtained in this study provide a basis to deploy low-cost cellular communication networks for the underserved areas in developing countries.


the internet of things | 2017

A review on smart grid network security issues over 6LoWPAN

Augustus E. Ibhaze; Moses U. Akpabio; S. N. John

With the evolution of the IoT initiative, data security has become of utmost importance, especially in the area of Smart Metering. The data being transferred across the smart Grid contains sensitive information, which, if not protected from the hands of data thieves would pose a serious security threat. The threat would primarily come in form of informed predictions of the lifestyles of their victims i.e. when they watch TV, when they switch off their loads to go to work and so on. Due to this security threats, the network on which this data transfer is performed will have to be secured. The 6LoWPAN is the network on which the metering devices (which are basically low-power, low-processing devices) will communicate with each other and the Data Analysis Module. Since the 6LoWPAN is the IPv6 for low power devices, it inherits the security and privacy functionalities of the IPv6. This paper will be focused on the techniques of protecting the 6LoWPAN from attacks. It will also talk about the different attacks as well as their methods of protection as regards to the Routing Protocol Layer.

Collaboration


Dive into the S. N. John's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge