After the emergence of IEEE 802.11, Wi-Fi has made a big impact on the wireless network environme... more After the emergence of IEEE 802.11, Wi-Fi has made a big impact on the wireless network environment. With decent data rate available lately at low cost, implementation of wireless networks are growing all over the place. To deliver bandwidth of around 54 Mbps, 802.11g was released. This paper seeks to compare wireless N (802.11n) and wireless G (802.11g) standards in terms of performance and reliability. Since security cannot be overemphasized when dealing with Wireless LAN, this paper also looks at the security implementation of these standards. It is worth nothing that the effectiveness of a wireless network depends on the structure of the building, interference with other networks and security implemented. This paper could be useful for those who want increase in bandwidth with strong security encryption activated. It is tuned to small and medium scale enterprises and also home users.
N e w Y o r k S c i e n c e J o u r n a l 2 0 1 0 ; 3 (4) Abstract: This paper presents a mobile ... more N e w Y o r k S c i e n c e J o u r n a l 2 0 1 0 ; 3 (4) Abstract: This paper presents a mobile application that could be used during geological field exploration placing emphasis on Geochemical Soil Sampling technique to capture data. Geological Soil Sampling Field data recorded digitally benefits from quick processing, hence facilitating the mineral exploration task and reducing exploration duration. This paper describes a prototype application developed with NetBeans IDE 6.7/J2ME Wireless Toolkit 2.2 emulator platform, which could run on any MIDP compatible devices. [New York Science Journal 2010;3(4):54-65]. (ISSN: 1554-0200).
The proliferation of Information and Communication Technologies (ICT) coupled with sophisticated ... more The proliferation of Information and Communication Technologies (ICT) coupled with sophisticated network protocols have unveiled new avenues for enterprises and organizations and the hospitality industries cannot be left out. Technology-based systems stand in a pivotal position to offer better service to the populace. Hospitality industries such as hotels can take advantage of the pervasiveness of ICT vis-à-vis technology-based systems to advance some of their operations. This paper seeks to assess the use of Information and Communication Technologies (ICT) in a front office operation of chain hotels in Ghana. The paper determines the extent of the use of information technology in a front office operation of chain hotels in Ghana. The paper continues to assess the effect of the use of information technology in the front office operation of chain hotels in Ghana, thus if the use of IC s. The paper further makes recommendations to chain hotel operators and the Ghana Tourist Authority (GTA) and policy makers on the use of information and communications technology in front office operation in chain hotels. Three chain hotels in Ghana were assessed.
Mining operations adversely affect water bodies by way of releasing toxics into local streams and... more Mining operations adversely affect water bodies by way of releasing toxics into local streams and filling in entire valleys. There are fears that, mining activities could cause serious metal pollution to water resources in its catchment area. This poses a threat to human use as well as the existence of aquatic organisms. The number of victims affected by mining related diseases is bound to escalate in the future if effective monitoring water resource around its catchment area is not conducted. In view of this, there is the need to have a system that would aid environmental authorities to monitor the pollution levels of these water bodies around the mining communities. This paper seeks to design a cost effective logger that could be used to monitor the degree of ionic concentration of these water bodies found around mine operation areas. The device measures and monitors the Total Dissolved Solids (TDS) levels of these water bodies around the mining.
—Computer networks are constantly under threats from intruders affectionately called hackers. Thi... more —Computer networks are constantly under threats from intruders affectionately called hackers. This paper looks at assessing the extent to which the Internet abounds in easily accessible freeware computer security tools and online resources which can facilitate unauthorised computer network intrusions. The current position of open source computer network security tools, computer operating systems' vulnerabilities and vendors' responsibility towards their customers would be covered in this paper. The paper also looks at a couple of freeware computer security tools and a handful of computer system vulnerability websites as well. A virtual computer network environment was setup to demonstrate how some computer security tools can be exploited for malicious purposes. A survey to solicit opinions on freeware computer security toolkit was commissioned to ascertain the extent to which respondents use computer security freeware. The concept of some companies trading in computer system exploits would be explored by this paper. An appraisal of a few groups behind the development of some of these freeware computer security tools i.e. hacking tools and why the need for these tools would be also explored. Suggestions of possible defensive countermeasures against malicious use of hacking freeware computer tools would be touched upon. The paper is to inform and educate ICT professionals to be very heedful and pay mindfulness to suggested defensive countermeasures.
─Smart homes automations no longer exist as design concepts for the future generation. With the f... more ─Smart homes automations no longer exist as design concepts for the future generation. With the fast growing and increasing trends in technologies in smart systems, the development of smart homes have seen innovative trends in designs. The aged, Alzheimer and Anosmia patients and people with disability face many difficulties in going about their routines at home. The challenges they encounter especially when they are at home alone pose a threat to their safety and security. This paper seeks to design and prototype a smart home which consists of a lighting control system developed with photo sensors to regulate the external and internal lighting and a vibrating alert system to assist the deaf when the doorbell rings or scenarios that may endanger them using Arduino microcontroller. A human-movement detection system was also integrated into the design to enhance security. The Alzheimer patient is assisted by a gas detection system. The smart home developed is monitored and controlled remotely using a web browser. The prototype has been tested and found to be very assistive to the aged and disabled.
Wireless networking is one of the exciting developments in the world of networking technology. Af... more Wireless networking is one of the exciting developments in the world of networking technology. After the introduction of IEEE 802.11 Ethernet standard, Wi-Fi has become the most widely adopted wireless networking type on the wireless network environment. Since wireless networking is easy to deploy and upgrade and with decent data rate available today at low cost, implementation of wireless networking is growing all over the place. Organizations and enterprises are switching from the traditional wired networks to wireless networking. Wireless can serve in many capacities, from a simple extension to a distribution point. One of the leading glitches with wireless networking is that, the wireless networking devices provide no security as they come out of their boxes. Considering the fact that wireless networks are built on a shared medium and data packets float through the air on radio waves, security cannot be overemphasized when dealing with wireless networking. It is arguable that many network users don't have procedures when they deploy their WLAN for the first time. It is the dearth of procedures that help attackers get into any networks they want. This paper seeks to demystify the security issues of the IEEE 802.11 wireless standards. The paper goes on to address these security concerns and points out the method used to secure a wireless network.
—After the emergence of IEEE 802.11, Wi-Fi has made a big impact on the wireless network environm... more —After the emergence of IEEE 802.11, Wi-Fi has made a big impact on the wireless network environment. With decent data rate available lately at low cost, implementation of wireless networks are growing all over the place. To deliver bandwidth of around 54 Mbps, 802.11g was released. This paper seeks to compare wireless N (802.11n) and wireless G (802.11g) standards in terms of performance and reliability. Since security cannot be overemphasized when dealing with Wireless LAN, this paper also looks at the security implementation of these standards. It is worth nothing that the effectiveness of a wireless network depends on the structure of the building, interference with other networks and security implemented. This paper could be useful for those who want increase in bandwidth with strong security encryption activated. It is tuned to small and medium scale enterprises and also home users.
After the emergence of IEEE 802.11, Wi-Fi has made a big impact on the wireless network environme... more After the emergence of IEEE 802.11, Wi-Fi has made a big impact on the wireless network environment. With decent data rate available lately at low cost, implementation of wireless networks are growing all over the place. To deliver bandwidth of around 54 Mbps, 802.11g was released. This paper seeks to compare wireless N (802.11n) and wireless G (802.11g) standards in terms of performance and reliability. Since security cannot be overemphasized when dealing with Wireless LAN, this paper also looks at the security implementation of these standards. It is worth nothing that the effectiveness of a wireless network depends on the structure of the building, interference with other networks and security implemented. This paper could be useful for those who want increase in bandwidth with strong security encryption activated. It is tuned to small and medium scale enterprises and also home users.
N e w Y o r k S c i e n c e J o u r n a l 2 0 1 0 ; 3 (4) Abstract: This paper presents a mobile ... more N e w Y o r k S c i e n c e J o u r n a l 2 0 1 0 ; 3 (4) Abstract: This paper presents a mobile application that could be used during geological field exploration placing emphasis on Geochemical Soil Sampling technique to capture data. Geological Soil Sampling Field data recorded digitally benefits from quick processing, hence facilitating the mineral exploration task and reducing exploration duration. This paper describes a prototype application developed with NetBeans IDE 6.7/J2ME Wireless Toolkit 2.2 emulator platform, which could run on any MIDP compatible devices. [New York Science Journal 2010;3(4):54-65]. (ISSN: 1554-0200).
The proliferation of Information and Communication Technologies (ICT) coupled with sophisticated ... more The proliferation of Information and Communication Technologies (ICT) coupled with sophisticated network protocols have unveiled new avenues for enterprises and organizations and the hospitality industries cannot be left out. Technology-based systems stand in a pivotal position to offer better service to the populace. Hospitality industries such as hotels can take advantage of the pervasiveness of ICT vis-à-vis technology-based systems to advance some of their operations. This paper seeks to assess the use of Information and Communication Technologies (ICT) in a front office operation of chain hotels in Ghana. The paper determines the extent of the use of information technology in a front office operation of chain hotels in Ghana. The paper continues to assess the effect of the use of information technology in the front office operation of chain hotels in Ghana, thus if the use of IC s. The paper further makes recommendations to chain hotel operators and the Ghana Tourist Authority (GTA) and policy makers on the use of information and communications technology in front office operation in chain hotels. Three chain hotels in Ghana were assessed.
Mining operations adversely affect water bodies by way of releasing toxics into local streams and... more Mining operations adversely affect water bodies by way of releasing toxics into local streams and filling in entire valleys. There are fears that, mining activities could cause serious metal pollution to water resources in its catchment area. This poses a threat to human use as well as the existence of aquatic organisms. The number of victims affected by mining related diseases is bound to escalate in the future if effective monitoring water resource around its catchment area is not conducted. In view of this, there is the need to have a system that would aid environmental authorities to monitor the pollution levels of these water bodies around the mining communities. This paper seeks to design a cost effective logger that could be used to monitor the degree of ionic concentration of these water bodies found around mine operation areas. The device measures and monitors the Total Dissolved Solids (TDS) levels of these water bodies around the mining.
—Computer networks are constantly under threats from intruders affectionately called hackers. Thi... more —Computer networks are constantly under threats from intruders affectionately called hackers. This paper looks at assessing the extent to which the Internet abounds in easily accessible freeware computer security tools and online resources which can facilitate unauthorised computer network intrusions. The current position of open source computer network security tools, computer operating systems' vulnerabilities and vendors' responsibility towards their customers would be covered in this paper. The paper also looks at a couple of freeware computer security tools and a handful of computer system vulnerability websites as well. A virtual computer network environment was setup to demonstrate how some computer security tools can be exploited for malicious purposes. A survey to solicit opinions on freeware computer security toolkit was commissioned to ascertain the extent to which respondents use computer security freeware. The concept of some companies trading in computer system exploits would be explored by this paper. An appraisal of a few groups behind the development of some of these freeware computer security tools i.e. hacking tools and why the need for these tools would be also explored. Suggestions of possible defensive countermeasures against malicious use of hacking freeware computer tools would be touched upon. The paper is to inform and educate ICT professionals to be very heedful and pay mindfulness to suggested defensive countermeasures.
─Smart homes automations no longer exist as design concepts for the future generation. With the f... more ─Smart homes automations no longer exist as design concepts for the future generation. With the fast growing and increasing trends in technologies in smart systems, the development of smart homes have seen innovative trends in designs. The aged, Alzheimer and Anosmia patients and people with disability face many difficulties in going about their routines at home. The challenges they encounter especially when they are at home alone pose a threat to their safety and security. This paper seeks to design and prototype a smart home which consists of a lighting control system developed with photo sensors to regulate the external and internal lighting and a vibrating alert system to assist the deaf when the doorbell rings or scenarios that may endanger them using Arduino microcontroller. A human-movement detection system was also integrated into the design to enhance security. The Alzheimer patient is assisted by a gas detection system. The smart home developed is monitored and controlled remotely using a web browser. The prototype has been tested and found to be very assistive to the aged and disabled.
Wireless networking is one of the exciting developments in the world of networking technology. Af... more Wireless networking is one of the exciting developments in the world of networking technology. After the introduction of IEEE 802.11 Ethernet standard, Wi-Fi has become the most widely adopted wireless networking type on the wireless network environment. Since wireless networking is easy to deploy and upgrade and with decent data rate available today at low cost, implementation of wireless networking is growing all over the place. Organizations and enterprises are switching from the traditional wired networks to wireless networking. Wireless can serve in many capacities, from a simple extension to a distribution point. One of the leading glitches with wireless networking is that, the wireless networking devices provide no security as they come out of their boxes. Considering the fact that wireless networks are built on a shared medium and data packets float through the air on radio waves, security cannot be overemphasized when dealing with wireless networking. It is arguable that many network users don't have procedures when they deploy their WLAN for the first time. It is the dearth of procedures that help attackers get into any networks they want. This paper seeks to demystify the security issues of the IEEE 802.11 wireless standards. The paper goes on to address these security concerns and points out the method used to secure a wireless network.
—After the emergence of IEEE 802.11, Wi-Fi has made a big impact on the wireless network environm... more —After the emergence of IEEE 802.11, Wi-Fi has made a big impact on the wireless network environment. With decent data rate available lately at low cost, implementation of wireless networks are growing all over the place. To deliver bandwidth of around 54 Mbps, 802.11g was released. This paper seeks to compare wireless N (802.11n) and wireless G (802.11g) standards in terms of performance and reliability. Since security cannot be overemphasized when dealing with Wireless LAN, this paper also looks at the security implementation of these standards. It is worth nothing that the effectiveness of a wireless network depends on the structure of the building, interference with other networks and security implemented. This paper could be useful for those who want increase in bandwidth with strong security encryption activated. It is tuned to small and medium scale enterprises and also home users.
Uploads
Papers
Conference Presentations