
Awotunde J. Bamidele- Doctor of Philosophy
- Lecturer at University of Ilorin
Awotunde J. Bamidele
- Doctor of Philosophy
- Lecturer at University of Ilorin
About
256
Publications
65,284
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,515
Citations
Introduction
Joseph Bamidele AWOTUNDE, is a Senior Lecturer in the Department of Computer Science, Faculty of Communication and Information Sciences, University of Ilorin, Nigeria. He is a recipient of Faculty of Information and Communication Science, University of Ilorin, Nigeria: The Faculty Researcher of the Year 2024. He is listed in the World's Top 2% Scientists for single-year impact for the year 2024 (compiled by John P.A. Ioannidis, Stanford University & published by Elsevier BV).
Current institution
Publications
Publications (256)
This article discusses Blockchain and Generative AI in healthcare, including their uses, difficulties, and solutions. Blockchain technology improves EHR security, privacy, and interoperability, while smart contracts streamline supply chain management and administrative procedures. Blockchain verifies and secures IoT data, improving medical care and...
The proposed combination of Message Queuing Telemetry Transport (MQTT), Ordering points to identify the clustering structure (OPTICS), Spiking Neural Networks (SNNs), and Mist computing improves real-time processing of IoT data by tackling issues with event-driven analytics, communication, and clustering. Effective clustering and anomaly detection...
In this paper, we propose a novel method for producing image captions through the utilization of Generative Adversarial Networks (GANs) and Vision Transformers (ViTs) using our proposed Image Captioning Utilizing Transformer and GAN (ICTGAN) model. Here we use the efficient representation learning of the ViTs to improve the realistic image producti...
The worldwide process of converting most activities of both corporate and non-corporate entities into digital formats is now firmly established. Machine learning models are necessary to serve as a tool for preventing illegal intrusion onto different networks. The machine learning (ML) model's strengths and drawbacks pertain to intrusion detection (...
The incorporation of Artificial Intelligence (AI) into the fields of Neurosurgery and Neurology has transformed the landscape of the healthcare industry. The present study describes seven dimensions of AI that have transformed the way of providing care, diagnosing, and treating patients. It has exhibited unparalleled accuracy in analyzing complex m...
Road accidents is a major problem. It poses a huge threat to the driver, the passengers, the pedestrians, and the society in general. The World Health Organization (WHO) identified crashes involving vehicles as one of the most common causes of mortality in the world, causing considerable losses to our country’s current and future productive manpowe...
The growing advancement of different jobs, skills and businesses has stimulated the spread of diseases. Most of the time, these diseases can cross countries’ borders and spread at a very rapid rate. Avoiding and detecting these infections have proved to be a major problem for our public health and one that must be treated with great importance. Cro...
Blockchain and cloud computing offer promising avenues to address these needs by enhancing data security, improving access to personal health records, and facilitating real-time health monitoring and telehealth services. Therefore, this chapter explores the use of blockchain and cloud computing in developing intelligent healthcare systems for elder...
Blockchain and the Internet of Things (IoT) are becoming pivotal in the IT industry, finding applications in sectors like supply chain, logistics, and the automotive industry. IoT devices often have limited processing and storage capabilities, leading to the centralization of user medical data in third-party repositories or cloud environments. Bloc...
Mobile technology is developing significantly. Mobile phone technologies have been integrated into the healthcare industry to help medical practitioners. Typically, computer vision models focus on image detection and classification issues. MobileNetV2 is a computer vision model that performs well on mobile devices, but it requires cloud services to...
The process of software defect prediction (SDP) involves predicting which software system modules or components pose the highest risk of being defective. The projections and discernments derived from SDP can then assist the software development team in effectively allocating its finite resources toward potentially susceptible defective modules. Bec...
This study aims to protect software development by creating a Software Risk Assessment (SRA) model for each phase of the Software Development Life Cycle (SDLC) using an Adaptive Neuro-Fuzzy Inference System (ANFIS) model. Software developers discovered and validated the risk variables affecting each SDLC phase, following which relevant data about r...
Fast Flux Botnet (FFB) poses a significant threat as an advanced method employed by cybercriminals for orchestrating distributed malicious attacks. Existing FFB detection systems face challenges such as vulnerability to evasion mechanisms, prolonged detection times, and high dimensionality of the feature set. In response to these issues, this study...
Cloud computing and the increasing popularity of 5G have greatly increased the application of images on Internet of Things (IoT) devices. The storage of images on an untrusted cloud has high security and privacy risks. Several lightweight cryptosystems have been proposed in the literature as appropriate for resource-constrained IoT devices. These e...
Academic performance is the assessment of knowledge gained by students for a particular period. Therefore, predicting student’s academic performance is a vital part of quality assurance in higher learning. As such, their prediction becomes pertinent to higher institutions as it can be used to monitor student’s progress and forestall the risk of stu...
This paper proposes a novel data communication model for the Internet of Medical Things (IoMT) powered smart healthcare applications based on blockchain and cryptography. The proposed model enhances the data communication security of IoMT applications through the distributed ledger technology of blockchain and encryption algorithms of cryptography....
Early detection and prediction of melanoma can help control large-scale outbreaks and reduce the transmission of epidemics in rapid response to serious public health events. Melanoma is one of the most dangerous types of skin cancer in the world which is responsible for the greatest number of skin cancer-related deaths. As predicted by the World He...
The need to secure Internet applications on global networks has become an important task due to the ever-increasing cybercrimes. A common technique for identifying intrusions in computer networks is the Network Intrusion Detection System (NIDS). Several Intrusion Detection Systems have been proposed previously, but these systems are still limited i...
Music Information Retrieval (MIR) methods extracts from music high-level information like classification, musical feature extraction, song similarity and tonality. Musical genre is one of the orthodox methods of describing musical content and a significant part of MIR. At present, few MIR research has been done on Nigerian songs. So, this paper pro...
The combination of several Machine Learning and Deep Learning techniques has been spurred by the
need to address security breaches inside an Internet of Things (IoT) focused environment. This research
presents a novel way to solve the challenge of classifying normal and abnormal attacks on the Domain
Name System (DNS) protocol. The proposed method...
AI and sustainable agriculture have emerged as two intersecting fields with the potential to revolutionize food production and address pressing environmental challenges. This chapter explores the integration of AI technologies into agricultural practices to enhance efficiency and productivity while considering the ethical implications associated wi...
Internet of Things (IoT) devices are challenging to manage information security due to some factors such as processing capability, exponential growth in homes, and their low energy consumption which raises the risk of cyberattacks. One way to avoid cyberattacks is using an intrusion detection system that is able to recognize assaults while warning...
Biometric identification still remains one of the most reliable and consistent methodologies for identification as established over the years from various studies among other authentication systems. Fingerprint biometrics is the most commonly and universally accepted biometric due to its uniqueness among all other biometrics. Minutiae algorithm rem...
Alzheimer’s disease is a progressive neurodegenerative disorder for which early identification is of paramount importance for a holistic treatment plan. Traditional methods of diagnosis require extensive manual interventions, making their scalability and reproducibility difficult. This paper presents a novel Bio-Inspired Salp Swarm Algorithm (BI-SS...
A literature review assists authors in evaluating and analyzing relevant literature, identifying conceptual content in the subject, and contributing to theory building in a specific domain. As a result, the goal of this article is to conduct a concept-centric review of cybersecurity in logistics, and supply chain management (SCM) in order to identi...
INTRODUCTION: The human blood as a collection of tissues containing Red Blood Cells (RBCs), circular in shape and acting as an oxygen carrier, are frequently deformed by multiple blood diseases inherited from parents. These hereditary diseases of blood involve abnormal haemoglobin (Hb) or anemia which are major public health issues. Sickle Cell Dis...
Artificial intelligence (AI) has been shown to be a formidable instrument in managing Big Healthcare Data, and it has seen considerable success in bioinformatics. The advancement of big data in biological sciences has given rise to big data analytics (BDA) and artificial intelligence (AI). Because the AI methodologies used in bioinformatics are par...
A new network architecture called the Software-Defined Network (SDN) gives next-generation networks a more flexible and efficiently controlled network architecture. Using the programmable central controller design, network supervisors may easily supervise and manage the entire infrastructure. However, due to its centralized structure, SDN has been...
The emergence of the Internet of Things (IoT) accelerated the implementation of various smart city applications and initiatives. The rapid adoption of IoT-powered smart cities is faced by a number of security and privacy challenges that hindered their application in areas such as critical infrastructure. One of the most crucial elements of any smar...
According to the Breast Cancer Institute, one of the most hazardous diseases for women is breast cancer (BCI). Clinical specialists claim that detecting this malignancy early can save lives. More than 120 distinct tumors and related hereditary illnesses have individualized resources available, according to cancer.net. To diagnose breast cancer, mac...
The emergence of new technologies that focuses on the Cognitive Internet of Things (CIoT) and Cloud computing reveals arouse modern method for control Coronavirus (COVID-19) pandemic globally. Their use has proved effective in managing the pandemic by exploiting huge amount of data brought about with the use of IoT and cloud-based storage. Their im...
Multi-label modeling of clinical data is a challenging classification problem especially for diseases with comorbidities. The complexity of the dataset makes it difficult to detect hidden pattern and infer useful information about disease classes that can occur simultaneously or successively. The presence of comorbidities has a significant impact o...
Passive (low-frequency) radio-frequency identification (RFID) technology is being used in an increasing number of contactless systems. This project presents contactless attendance system passive radio-frequency identification (RFID)-based approach. RFID is a technology that uses radio waves to send information from an RFID tag attached to an object...
Alzheimer's disease (AD) is a long-lasting, degenerative brain illness for which there is now no successful treatment. However, there are medications that can delay its growth and stop its tracks. Therefore, stopping and regulating the progression of AD depends greatly on its early diagnosis. Computer-aided diagnosis (CAD) in health care has become...
The Internet of Things (IoT) and cloud computing have revolutionized the technological era unabatedly. These technologies have impacted our lives to a great extent. The traditional cloud model faces a variety of complications with the colossal growth of IoT and cloud applications, such as network instability, reduced bandwidth, and high latency. Fo...
The rapid development of digital data sharing has made information security a crucial concern in data communication. The information security system heavily relies on encryption methods. These algorithms employ strategies to increase data secrecy and privacy by obscuring the information, which only those parties who have the accompanying key can de...
The COVID-19 pandemic that affected the entire world in the year 2020 sparked interest in research aimed at reducing the mortality rate of patients who contracted the virus. According to research, the majority of these fatalities are brought on by carelessness and negligence toward their health. Recent technological advancements have made it possib...
The disease of breast cancer is now widespread throughout the world. Expert systems are useful tools that have been effective in the diagnosis of various diseases. Therefore, this paper develops an expert system for diagnosis and detection of breast cancer using fuzzy logic enabled with clustering classifier. The fuzzy logic provides a bridge in im...
Cybersecurity in network-based computing systems has grown to be a significant concern in today's society. Attackers and unauthorized users are coming up with fresh methods of network infiltration due to the sharp growth in internet activity. An intrusion detection system (IDS) is created to identify assaults in a network connection to solve this i...
The growth of internet used automobile shopping has been tremendous in recent years. It is important for sellers to correctly evaluate the price of the used cars. From the literature, classification is an approach that assists in data interpretation by analyzing data and providing a second opinion on data among other tasks most of the classifiers u...
The emergence of the Internet of Things (IoT) has witnessed immense growth globally with the use of various devices found in home, transportation, healthcare, and industry. The deployment and implementation of the IoT paradigm in industrial settings lead to the architectural changes of Industrial Automation and Control Systems (IACS) plus the count...
Currently, heart rate monitoring method using photoplethysmography has attracted a lot of attention because of its advantages. However, the results of photoplethysmography (PPG) recordings are susceptible to interference with motion artifacts (MA) that can reduce the accuracy of their readings. This study aimed to determine the performance of the F...
Mobile edge computing (MEC) supported by non-orthogonal multiple access (NOMA) has recently gained a lot of interest due to its improved ability to lessen power consumption and MEC offload delay. In recent decades, the need for wireless communications has increased tremendously. Fifth-generation (5G) communications will soon be widely used and offe...
Cyber-Physical Systems (CPS) is an emerging technology closely related to the Internet of Things (IoT) schemes, but CPS centers on the occurrence of computation processes, networking, and physical layers. The CPS involves many interconnected systems that can manipulate and monitor the operations of real objects. The evolution of CPS has significant...