<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>DSpace Collection:</title>
  <link rel="alternate" href="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/93" />
  <subtitle />
  <id>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/93</id>
  <updated>2026-05-02T21:17:16Z</updated>
  <dc:date>2026-05-02T21:17:16Z</dc:date>
  <entry>
    <title>A Survey of the Primary User Emulation Attack in the Cognitive  Radio Networks</title>
    <link rel="alternate" href="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30180" />
    <author>
      <name>Olaleru, Grace</name>
    </author>
    <author>
      <name>Ohize, H</name>
    </author>
    <author>
      <name>Dauda, U. S.</name>
    </author>
    <author>
      <name>Mohammed, Abubakar Saddiq</name>
    </author>
    <id>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/30180</id>
    <updated>2025-12-07T16:25:50Z</updated>
    <published>2022-01-01T00:00:00Z</published>
    <summary type="text">Title: A Survey of the Primary User Emulation Attack in the Cognitive  Radio Networks
Authors: Olaleru, Grace; Ohize, H; Dauda, U. S.; Mohammed, Abubakar Saddiq
Abstract: Cognitive Radio Technology (CRT) helps alleviate the spectrum scarcity and spectrum underutilization problems experienced by wireless networks and wireless devices by enabling the intelligent and opportunistic use of the licensed frequency band by unlicensed users. However, due to its wireless nature, it is subject to some security threats that affect the practical implementation of the CRT. In this paper, we have discussed some of the security threats affecting the protocol stack and the five layers of the Cognitive Radio Network (CRN), with a focus on the Primary User Emulation Attack (PUEA). The PUEA is one of the most common attacks on the CRN’s physical layer. In this attack, a selfish or malicious user mimics the primary user's (PU) signal features to fool the legitimate secondary users (SUs), causing the legitimate SUs to leave the available channel while the real PU is absent. Although many review papers enhanced our knowledge of the PUEA, in this paper we meld new research findings with the old ones to keep up the pace in the research community. &#xD;
Also, we discussed some detection and countermeasures for the PUEA in the CRN. Finally, a summary of the findings on how best to mitigate the effect of PUE attacks in the CR is presented.</summary>
    <dc:date>2022-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Wireless Power Transmission</title>
    <link rel="alternate" href="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/28017" />
    <author>
      <name>Onwuka, E. N.</name>
    </author>
    <author>
      <name>Salawu, N.</name>
    </author>
    <author>
      <name>Ahmed, O. D.</name>
    </author>
    <id>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/28017</id>
    <updated>2024-05-06T14:23:23Z</updated>
    <published>2006-01-01T00:00:00Z</published>
    <summary type="text">Title: Wireless Power Transmission
Authors: Onwuka, E. N.; Salawu, N.; Ahmed, O. D.</summary>
    <dc:date>2006-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>A Cost Function Algorithm for Mobility Load Balancing in LTE</title>
    <link rel="alternate" href="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/28016" />
    <author>
      <name>Salawu, N.</name>
    </author>
    <author>
      <name>Sharifah, H. S. F.</name>
    </author>
    <id>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/28016</id>
    <updated>2024-05-06T14:16:16Z</updated>
    <published>2012-01-01T00:00:00Z</published>
    <summary type="text">Title: A Cost Function Algorithm for Mobility Load Balancing in LTE
Authors: Salawu, N.; Sharifah, H. S. F.</summary>
    <dc:date>2012-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Review: Circle Packing Theory Based System Modelling in Unmanned Area Vehicle Deployment Optimization</title>
    <link rel="alternate" href="http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/28015" />
    <author>
      <name>Fadare, S. A.</name>
    </author>
    <author>
      <name>Ohize, H.</name>
    </author>
    <id>http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/28015</id>
    <updated>2024-05-06T14:09:23Z</updated>
    <published>2021-01-01T00:00:00Z</published>
    <summary type="text">Title: Review: Circle Packing Theory Based System Modelling in Unmanned Area Vehicle Deployment Optimization
Authors: Fadare, S. A.; Ohize, H.
Abstract: Numerous applications of UAVs cannot be overemphasized which include providing communication links for&#xD;
emergency purposes and temporary availability in remote locations. The use of directional antenna facilitates the horizontal plane circular 2D shape of the communication link coverage area of Aerial BS or UAV. Hence, in many literatures, CPT was discovered to be an important basic tool in formation of different system models for&#xD;
optimization of deployment of Aerial BS for possible maximal user density within the covered region. This paper&#xD;
presented such models for study to enhance possibilities of proffering a CPT based procedure for developing novel algorithms or system models for future deployments of Aerial base stations.</summary>
    <dc:date>2021-01-01T00:00:00Z</dc:date>
  </entry>
</feed>

