J. Isabona, C. C. Konyeha, B. C. Chinule, and G. P. Isaiah, "Radio field strength propagation data and pathloss calculation methods in UMTS network," Advances in Physics Theories and Applications, vol. 21, pp. 54 - 68, 2013.
A. Goldsmith, Wireless communication. New York: Cambridge University Press, 2005.
O. Shoewu, S. O. Olatinwo, and D. D. Olatinwo, "Comparative analysis of path loss in metropolitan domain in Nigeria using Okumura-Hata model," European Journal of Scientific Research, vol. 4, pp. 5 -15, 2016.
R. Mardeni and T. S. Priya, "Optimized COST 231 hata models for WiMAX pathloss prediction in suburban and open urban environments," Modern Applied Science, vol. 4, pp.75, 2010. View at Google Scholar | View at Publisher
L. Akinyemi, N. Makanjuola, O. Shoewu, and F. Edeko, "Evaluation and analysis of 3G network in Lagos metropolis Nigeria," International Transaction of Electrical and Computer Engineers System, vol. 2, pp. 81-87, 2014. View at Google Scholar
S. Ajose and A. L. Imoize, "Propagation measurements and modelling at 1800 MHz in Lagos Nigeria," International Journal of Wireless and Mobile Computing, vol. 6, pp. 165-174, 2013. View at Google Scholar | View at Publisher
I. U. Nochiri, C. C. Osuagwu, and K. C. Okafor, "Empirical analysis on the GSM network KPIs using real-time methodology for a novel network integration," Progress in Science and Engineering Research Journal, vol. 13, pp. 092-107, 2014.
O. Shoewu and F. O. Edeko, "Propagation loss determination in cluster based GSM base stations in Lagos environs," International Transaction of Electrical and Computer Engineers System, vol. 2, pp. 28 - 33, 2014. View at Google Scholar
S. T. Rappaport, Wireless communications principles and practice, 2nd ed. U.S.A: University of Texas, 2002.
S. J. Seybold, Wireless communication principles and practice, 2nd ed. U.S.A: Prentice Hall, 2005.
T. Syahfrizal, "Using of the Okumura-Hata propagation model for pathloss determination in Tarakan," in Proceedings of the 3rd International Conference on Radar, Antenna, Microwave, Electronics and Telecommunications (ICRAMET), 2014, pp. 77-79.
Shoewu, O , Salau, N.O , Ogunlewe, A.O , Oborkhale, L.I (2016). Path Loss Measurement and Modeling for Lagos State G.S.M Environments. Review of Computer Engineering Research, 3(4): 69-81. DOI: 10.18488/journal.76/2016.3.4/22.214.171.124
This paper presents path loss measurement and modeling for Lagos state
dense-urban (DU), urban (UR), sub-urban (SU) and non-urban (NU) G.S.M
environments. It was carried out with data collection through drive
testing using TEMS software in the chosen environments Lagos-Island(DU),
Surulere (UR), Lekki-Oniru (SU), Agbede-Ikorodu (NU), over a distance
of 0.5-10Km from Base station (BS) to Mobile station (MS) with
measurement taken at 0.5Km intervals for a period of 52 weeks. Relative
parameters like Rxlev, RSSI, Path loss were measured in all areas of
investigation under 2G and 3G frequencies of operation and twelve (12)
different sites location were covered and analysed. COST 231-Hata model
was used as reference model for path loss calculation of field data,
this was further adjusted to develop optimized models (tagged OMODEEN
models) for path loss prediction in all environments of study, which
shows results within 6dB acceptable range, hence recommended for
modeling in these environs and other similar G.S.M environments.
This study is one of very few studies which have investigated path loss
in classified environment. Effort was geared towards four chosen
environment in Lagos metropolitan terrain. A new model known as OMODEEN
was developed and can be used for specific environs. MATLAB was used to
develop graphical representation of the model.
Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador
P. D. Student, S. Moisés, T. Toapanta, P. D. Luis, and E. Mafla, "Security analysis of civil registry database of ecuador," in 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT). “Special Section Computer Science/Networking”. IEEE Catalog, Chennai – India, 2016, pp. 1024–1029.
T. J. O. Moisés and E. Mafla., "Analysis to define management of identities access control of security processes for the registration civil from Ecuador," in 2016 IEEE International Smart Cities Conference (ISC2) - IEEE ISC2 2016- Privacy and Security Track. IEEE Catalog, Trento – Italy, 2016, pp. 122-125.
R. O. S. De, H. Del, P. Barrezueta, D. E. L. E. Y. Organica, D. E. G. D. E. La, and I. Y. Datos, "Ley orgánica de gestión de la identidad y datos civiles," Quito- Ecuador, 2016.
M. Toapanta, E. Mafla, and J. Orizaga, "Conceptual model for identity management to mitigate the database security of the registry civil of Ecuador," in Materials Today: Proceedings Tracks “Computer Science/Networking”. ISSN 2214-7853. Indexed in Scopus (Elsevier) and the CPCI (Thomson Reuters, Web of Science). Impact SJR, United Kingdom, 2016.
C. M. Quispe and P. D. E. Red, "Protocolos de comunicación utilizados en cloud computing," Revista de Información, Tecnología y Sociedad2012.
W. Tim, "Image reduction operators based on non-monotonic averaging functions," IEEE Xplore, 2013.
A. Han, "Biometric-Kerberos authentication scheme for secure mobile computing services," presented at the Image and Signal Processing (CISP), 2013 6th International Congress on, 2013.
J. Feng and X. Coll, "Analysis, implementation and extensions of RADIUS protocol," presented at the Networking and Digital Society, 2009. ICNDS ’09. International Conference on, 2009.
D. Wei, Y. Liu, X. Yu, and X. Li, "Research of mobile IPv6 application based on diameter protocol," presented at the Computer and Computational Sciences, 2006. IMSCCS ’06. First International Multi-Symposiums, 2008.
G. K. Lee and J. Y. Choi, "Formal verification of PAP and EAP-MD5 protocols in wireless networks," presented at the Advanced Information Networking and Applications, 2004. AINA 2004. 18th International Conference, 2004.
J. R. Arana, A. V. Leandro, and P. Oscar, "Implementation of network access control by using authentication, authorization and accounting protocols," Ingeniería y Competitividad, vol. 15, pp. 127-137, 2013.
R. Carrillo, "Redalyc. La consumer protection in electronic payment transactions," Electron. Stud. Teleprocessing, vol. 6, pp. 33-49, 2007.
V. Neumann, C. L. Gomes, C. Unsihuay-Vila, K. V. Fonseca, and P. R. Torres, "Parameterization of IPsec framework for security in the smart grid interoperability," presented at the Innovative Smart Grid Technologies Latin America (ISGT LATAM), 2015 IEEE PES, 2015.
A. Fritz and J. F. Paris, "Maille authorization - A distributed, redundant authorization protocol," in Performance, Computing, and Communications Conference, 2006. IPCCC 2006. 25th IEEE International Date of Conference, 2006.
Moises Toapanta , Enrique Mafla , Jose Orizaga (2016). Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador. Review of Computer Engineering Research, 3(4): 65-68. DOI: 10.18488/journal.76/2016.3.4/126.96.36.199
Different security protocols were analyzed are used for a centralized
database with distributed architecture. The goal is identify adequate
security protocols to mitigate the security of information through
identity of a model without relying on technological infrastructures. In
this phase the suitable security protocols for a model of identity
authentication, authorization and auditing (AAA) was analyzed. Deductive
method is used in exploratory research to analyze security protocols
more used among the main mentioned: Feret, Kerberos, Radius, Dnssec,
Ipsec, Pgp, Secure Rpc, Set, Ssl, Tls, Maille, Eap, Pap, Map, Diameter,
Peap, among others. It turned out that security protocols should be
adopted on a model of identity for a centralized data base. It was
concluded that protocols and security algorithms must have a direct
relation to the identity model; allowing mitigate the vulnerabilities
and risks considering To mitigate the threats and risks of information
with confidentiality, integrity and availability. The technological
infrastructure should not influence the implementation of different
This paper provides the first analysis to adopt appropriate security
protocols for an identity model with authentication, authorization and
auditing without relying on specific technological infrastructure for
Ecuador's civil registry; in a distributed architecture database.
Different civil registries of the world with similar characteristics can
refer this research project.