Matthew Adigun

Matthew Adigun
University of Zululand | uzulu · Department of Computer Science

PhD in Computer Science

About

213
Publications
40,536
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
821
Citations
Citations since 2017
74 Research Items
484 Citations
2017201820192020202120222023020406080
2017201820192020202120222023020406080
2017201820192020202120222023020406080
2017201820192020202120222023020406080
Additional affiliations
September 2004 - present
University of Zululand
Position
  • Head, Centre for Mobile r - services for Development,

Publications

Publications (213)
Chapter
A literature review assists authors in evaluating and analyzing relevant literature, identifying conceptual content in the subject, and contributing to theory building in a specific domain. As a result, the goal of this article is to conduct a concept-centric review of cybersecurity in logistics, and supply chain management (SCM) in order to identi...
Article
Full-text available
Among the technologies that have made 5G wireless communication successful are non‐orthogonal multiple access (NOMA) and cooperative NOMA. The distinction is that cooperative NOMA adds coding schemes to improve performance. Nevertheless, research on cooperative NOMA has primarily used theoretical correlation‐based stochastic models (CBSM) instead o...
Article
Full-text available
The Internet of Things (IoT) and cloud computing have revolutionized the technological era unabatedly. These technologies have impacted our lives to a great extent. The traditional cloud model faces a variety of complications with the colossal growth of IoT and cloud applications, such as network instability, reduced bandwidth, and high latency. Fo...
Article
Full-text available
Deep learning (DL) is becoming a fast-growing field in the medical domain and it helps in the timely detection of any infectious disease (IDs) and is essential to the management of diseases and the prediction of future occurrences. Many scientists and scholars have implemented DL techniques for the detection and prediction of pandemics, IDs and oth...
Article
Full-text available
The potential of the Non-Orthogonal Multiple Access (NOMA) approach for wireless communications in the fifth generation (5G) and beyond can not be underestimated. This is because users with favorable channel conditions can serve as relays to improve system performance by employing Successive Interference Cancellation (SIC). Lately, the combination...
Article
Full-text available
Since their inaugural releases in 2007, Google’s Android and Apple’s iOS have grown to dominate the mobile OS market share. Currently, they jointly possess over 99% of the global market share with Android being the leading mobile Operating System of choice worldwide, controlling close to 70% of the market share. Mobile devices have enabled the expo...
Article
Full-text available
The Internet of Things (IoT) is changing the way consumers, businesses, and governments interact with the physical and cyber worlds. More often than not, IoT devices are designed for specific functional requirements or use cases without paying too much attention to security. Consequently, attackers usually compromise IoT devices with lax security t...
Chapter
Over the past years, many algorithms have been proposed for task scheduling and congestion control in typical Networks, such as Round-Robbin, Greedy, and many others. Whilst these algorithms are very effective in their capacities to address the targeted problems yet to compare their performance concerning the level of stability they offered in resp...
Chapter
Full-text available
The reliability and transmission quality in any wireless communication network is paramount. Unmanned Aerial Vehicle (UAV) communication networks are no exception to this fact. Hence, the need to investigate various communication technologies that will improve and be able to support the various applications of the UAV communication network. Correla...
Article
Full-text available
In the past few decades, Cognitive Radio network (CRN) has been regarded in the literature as the most promising technology for performing dynamic spectrum management. One of the major aspects of spectrum management is referred to as the spectrum reconfiguration decision-making ability of CR users. Dynamic spectrum reconfiguration has previously be...
Article
Full-text available
Most cloud service e-marketplaces incorporate basic features like search and billing but lack more sophisticated elements that optimise users’ experience. The cognitive demands of searching for and evaluating multiple cloud SaaS along multiple QoS criteria can be overwhelming, giving rise to what Alvin Toffler called choice overload. There is a nee...
Chapter
Software-Defined Networking (SDN) has become a popular paradigm for modern day optimal performance of the network system as a result of the separation of the control component from other network elements. This enables the maintenance of the flow table structure on these devices while optimal forwarding of packets is enhanced via the central control...
Chapter
LoRa Networks is one of the fast-growing and promising technologies to enable communications for the Internet of Things (IoT) devices on a large scale or long-range communication. Spreading Factors (SF) plays a significant role in enabling multiple long-range receptions of packets with every packet assigned a different spreading factor. Therefore,...
Chapter
Software defined networking (SDN) has emerged as effective paradigm in which the working principle was based on the separation of data plane from the control plane. This approach has proved to be quite advantageous in terms of its flexibility and programmability, thus enhancing better service provisioning and innovative network management. Despite...
Article
Full-text available
The improvement in the management of Public Health through the public health man- agement system (PHMS) has become a bottleneck. Although the management of a large number of patients’ information has been studied, their networking aspect remains a chal- lenge in prompt assessment of their records. With a view to bringing about an efficient manage...
Chapter
The Internet of Things (IoT) is an emerging technology that has received much attention in recent years due to its ability to process data in real-time, speed up awareness and respond quickly to events. IoT aims to bring every object online, thereby generating increasing amounts of data. This exponential growth of network traffic calls for faster,...
Conference Paper
Full-text available
The research and education advancements in Africa have resulted in National Research and Education Networks (NRENs) having to spend millions on upgrading facilities and improving network availability for all. Unlike Internet service providers (ISPs), NRENs do not support infrastructure sharing, lack of telecom infrastructure and receiving governmen...
Conference Paper
Full-text available
Internet of Things (IoT) is an emerging technological paradigm that revolutionizes the way we communicate, live, work and play. Recent growth in the novel and cheap, sensor and actuation devices show that the interest in IoT technologies is phenomenal. IoT devices present several challenges due to device constraints such as limited power, storage,...
Conference Paper
Full-text available
Internet of things (IoT) is a developing technology that enables the devices to communicate without human interaction. Routing is an important factor affecting the connectivity and the performance of information exchange. The performance of IoT devices is dependent on the implemented routing protocol in those devices. Routing protocol for low power...
Chapter
The usage of service-level agreement (SLA) to ensure smooth negotiations, easy management, and provision of resources make it a reliable tool to ensure service guarantees in a network. Low-latency Internet connectivity services provided by edge servers such as a Cloudlet deployed in small–medium enterprises (SMEs) can benefit from SLA. This is due...
Conference Paper
Full-text available
Tactical Mobile Ad hoc Networks (TMANET) have received much attention in recent years due to their ability to provide network connectivity to tactical mobile nodes in a battlefield without any infrastructure. Additionally, they provide decentralization, self-organizing, robustness and scalability to tactical nodes. Research in the tactical network...
Conference Paper
Internet of Things (IoT) is a growing technology that is projected to have over 41.6 billion connected devices by 2025. The IoT idea is about connecting the unconnected things (sensors, clothes, refrigerators and others) to the existing network infrastructure. Across industries ranging from agriculture to manufacturing, organizations are rapidly gr...
Conference Paper
Full-text available
Network security remains a critical issue due to ongoing advancements in Information and Communication Technologies (ICT) and the concomitant rise in the number of security threats. Intrusion detection systems have emerged as an essential countermeasure to preserve network security. However, over the years, the challenge has been finding a detectio...
Conference Paper
Full-text available
Intrusion Detection Systems (IDS) are an important type of security tool that monitors network traffic for suspicious activities and issue alerts when malicious activities are discovered. Traditionally these methods use deep packet inspection approaches which analyze the entire packet payload to detect malicious activities. Reports indicate that th...
Conference Paper
Full-text available
This paper investigates spectrum occupancy focusing on TV bands. TV bands have the potential to exploit the available white space in order to improve the spectrum utilization opportunistically. It has been recognized that white space measurement and analysis are important for the wide deployment of next-generation cognitive wireless networks. Resea...
Conference Paper
This work investigates the efficiency of a re-engineered object-oriented C++ TACT1 program versus its original which was written in the FORTRAN77 programming language. FORTRAN was dominant in scientific computing throughout the 20th century because of its high performance in numerical analysis, but most of the systems built during this period have...
Conference Paper
Full-text available
The Internet of things is a developing technology that enables the devices to communicate without human interaction. However, the performance of IoT devices is dependent on the implemented routing protocols in those devices. The Internet Engineering Task Force group (IETF) developed the IPv6 Routing Protocol for low power and lossy networks (RPL) a...
Conference Paper
Full-text available
The Fog computing paradigm allow applications to be processed at the edge of a network. This paradigm is designed to mitigate high latency and the burden of task requests sent to centralized cloud servers by end devices. Fog computing permits different portions of applications to be scheduled to Fog nodes available at the edge. These Fog nodes offe...
Conference Paper
Full-text available
Despite its increased usage in industrial systems, cloud computing cannot meet some requirements of the next generation of industrial development where ultra-low latency is a requirement. This is due to its inherent limitations such as, unreliable latency, lack of mobility support and traffic congestion when communicating with end-users. Fog comput...
Conference Paper
Full-text available
The exponential growth of network traffic and the growing sophistication of network attacks call for faster, efficient and scalable intrusion detection systems (IDS) that will be able to quickly look into the traffic and timeously produce alerts when malicious traffic has been detected. Snort has been the de-facto standard of IDS for so many years...
Conference Paper
Full-text available
Cloud computing has emerged as a foremost and influential technology driver of business initiatives in recent times. Although, security is the most discussed concern on cloud platforms, other dependability attributes such as reliability, availability, robustness and the likes are also important for successful cloud implementations. So far, existing...
Article
Full-text available
The plethora of cloud application services (Apps) in the cloud business apps e-marketplace often leads to servicechoice overload. Meanwhile, existing SaaS e-marketplaces employ keyword-based inputs that do not consider boththe quantitative and qualitative quality of service (QoS) attributes that characterise cloud-based services. Also, existingQoS-...
Article
Full-text available
The dynamic spectrum management techniques have been introduced to address the current radio frequency bands inefficiency challenges. Few research works have attempted to address the dynamic reconfiguration problems in spectrum management using various approaches. However, these existing approaches have not been able to achieve optimal solution due...
Article
Full-text available
In line with the current growth of the small data ecosystem documented beautifully by smalldatagroup.com and other sources, this paper proposed a small data approach to Technology Maturity Status Mapping generalization, by creating a situation, out of small data scenarios, to drive the process. The research methodology focused on our earlier work o...
Article
Full-text available
The ad hoc mobile cloud (AMC) allows mobile devices to connect together through a wireless connection or any other means and send a request for web services from one to another within the mobile cloud. However, one of the major challenges in the AMC is the occurrence of dissatisfaction experienced by the users. This is because there are many servic...
Conference Paper
Full-text available
The dynamic spectrum management techniques have been introduced to address the current Radio Frequency bands inefficiency challenges. Cognitive Radio (CR) technology has been regarded as the most promising technology in the dynamic spectrum management area. One of the major aspects of the spectrum management is the decision making ability of CR use...
Article
Application service platforms, also called application Platform-as a Service (aPaaS), comprise a set of software and hardware components (databases, servers, network resources, integrated development environment) that provide mechanisms for the development, deployment and management of end-user application services in multiple business domains. The...
Conference Paper
Full-text available
Mobile technology has transcended various stages to bring about an improved way of life over the years. This is because mobile phones have proven to defile the stationary way of computing, which is not restricted by space or time. The usefulness of mobile phones has cut across all aspects of life, transforming beyond ordinary telephony system for t...