H. A. Eneh

H. A. Eneh

About

17
Publications
3,947
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
71
Citations

Publications

Publications (17)
Article
Full-text available
The growth rate of data in modern computing environments had posed great challenges in data structure optimization and management thereby making this study to re-evaluate traditional approaches in the context of Big Data dynamics. This research focuses on a novel "adaptive hybrid data structures for dynamic workload optimization in Big Data environ...
Article
The conventional topological approach to eliminate the multiple-input DC voltage requirement in multilevel inverter configurations for synthesizing high-output voltage levels is to deploy split capacitor banks at the input terminal. This method stipulates a less expensive, light weight, and reduced size inverter system. However, the excessive deman...
Article
Full-text available
The mobile aquaponics system is a sustainable integrated aquaculture-crop production system in which wastewater from fish ponds are utilized in crop production, filtered, and returned for aquaculture uses. This process ensures the optimization of water and nutrients as well as the simultaneous production of fish and crops in portable homestead mode...
Article
Online social networking (OSN) sites in addition to providing business and recreational opportunities are fast becoming a breeding ground for cyberbullying activities. Cyberbullying is an act of harassing or insulting a person by sending messages that are hurting or threatening in nature using electronic communication. Such messages include threats...
Article
Full-text available
Aquaculture, which is the breeding of fishes in artificial ponds, seems to be gaining popularity among urban and sub-urban dwellers in Sub-Saharan Africa and Asia. Tenant aquaculture enables individuals irrespective of their profession to grow fishes locally in a little space. However, there are challenges facing aquaculture such as the availabilit...
Conference Paper
Full-text available
We live in a virtual world where actual lifestyles are replicated. The growing reliance on the use of social media networks worldwide has resulted in great concern for information security. One of the factors popularizing the social media platforms is how they connect people worldwide to interact, share content, and engage in mutual interactions of...
Chapter
Full-text available
When the novel coronavirus, COVID-19 broke out in Wuhan China, not many in this generation knew how much impact it was going to have on our daily lives. The pandemic has resulted in the loss of thousands of lives, the collapse of businesses, indefinite closure of schools, and other activities resulting to the need for a ‘new normal’. Virologists, e...
Chapter
Context The peculiar technological challenges of developing countries have impaired E-learning. Poor supply of bandwidth for E-learning due to cost has led to delayed response times across the internet. Technical knowledge in developing E-learning systems does not suffice for an understanding in pedagogical approach to effective learning. Purpose o...
Conference Paper
Full-text available
CONTEXT The peculiar technological challenges of developing countries have impaired E-learning. Poor supply of band- width for E-learning due to cost has led to delayed response times across the internet. Technical knowledge in developing E-learning systems does not suffice for an understanding in pedagogical approach to effective learn- ing. PURPO...
Preprint
Full-text available
When the novel coronavirus, COVID-19 broke out in Wuhan China, not many in this generation knew how much impact it was going to have on our daily lives. The pandemic has resulted in the loss of thousands of lives, the collapse of businesses, indefinite closure of schools, and other activities. Virologists, epidemiologists, and every other scientist...
Article
Authentication mechanisms coupled with strong encryption techniques are used for network security purposes; however, given sufficient time, well-equipped intruders are successful for compromising system security. The authentication protocols often fail when they are analysed critically. Formal approaches have emerged to analyse protocol failures. I...
Conference Paper
Formal methods for verifying cryptographic protocols are used to assist in ensuring that authentication protocols meet their specifications. Model checking techniques such as CSP and FDR checker, are widely acknowledged for effectively and efficiently revealing flaws in protocols faster than most other contemporaries. Essentially, model checking in...
Conference Paper
Full-text available
Research works on the analysis and the development of authentication protocols frequently adopt the linear software development approach and are based on certain non-extensible assumptions (Tobler and Hutchison 2004), (Grob 2003), (Harbitter and Menasce 2002). This paper is part of an ongoing work regarding the development of a pre-emptive security...
Article
Full-text available
The development of authentication protocols has progressed from the notoriously error prone informal methods to formal methods. Formal methods include those of belief logics, model checking, and inductive proofs. This paper emphasizes the need for a more rigorous approach towards the analysis and verification of electronic commerce protocols especi...

Network

Cited By