About
42
Publications
1,750
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
28
Citations
Introduction
Welcome to my profile!
I'm glad to be a distinguish mathematician
Skills and Expertise
Current institution
Publications
Publications (42)
The global shift toward quantum computing presents both unprecedented opportunities and severe challenges to cybersecurity. In particular, the security of supply chains-a critical component of modern commerce and industrial activity-is increasingly vulnerable to quantum-enabled threats. This research article explores the intricate landscape of quan...
Quantum computing is rapidly emerging as a disruptive force with far-reaching implications across various domains, particularly cybersecurity. This paper investigates the intersection of quantum computing and critical infrastructure cybersecurity, highlighting the risks and opportunities associated with quantum advancements. Utilizing a comprehensi...
Generative AI agents represent a frontier in artificial intelligence, combining generative modeling capabilities with autonomous behavior and the ability to collaborate with humans and other agents. These systems are powered by innovative architectural designs that enable them to perceive, plan, act, and adapt within dynamic environments. This arti...
SQL Injection (SQLi) persists as a major threat to .NET applications since attackers can inject harmful SQL code into databases for database manipulation purposes. The presence of this vulnerability leads to hackers gaining access to unauthorized data and causing system integrity failure while resulting in lost data which threatens organizations ut...
Refugee and asylum-seeking women often experience compounded vulnerabilities due to their displacement status and gender-based inequalities, necessitating targeted interventions that are both trauma-informed and gender-sensitive. This article explores the importance of incorporating gender-sensitive approaches into resilience-building frameworks to...
Data management relies fundamentally on regulatory standard compliance while dealing with decisions that are data-driven. Real-time compliance requirements remain difficult to achieve through Extract Transform Load (ETL) processes which serve data integration functions at scale especially in big systems. The examination through this review examines...
When organizations start implementing microservices and the concept of continuous delivery pipeline, especially while using DevOps, deploying becomes a crucial task in which safety is a significant concern. Canary releases have become a profound practice for rolling out new application updates to a limited number of users in an organization to avoi...
Modern regulatory requirements demand organisations maintain complete transparency and precise trackability of data pipelines, which mainly apply to Extract Transform Load (ETL) operations. Data provenance management and lineage need proper control to produce reliable regulatory reports that withstand inspections from GDPR and BCBS 239 and HIPAA an...
The rapid evolution of cyber threats has underscored the necessity for advanced cybersecurity mechanisms to safeguard sensitive data and digital infrastructures. Intrusion Detection Systems (IDS) have been critical in identifying malicious activities in real-time, but their effectiveness is often hindered by scalability and reliability issues. The...
The advent of quantum computing presents both unprecedented opportunities and significant threats to current cybersecurity infrastructures. As quantum technologies advance, the potential to undermine traditional cryptographic systems becomes a pressing concern for nations and organizations worldwide. This article provides a comprehensive analysis o...
Emotion recognition systems have made substantial progress through deep learning technologies, enabling machines to interpret human affect with remarkable accuracy. However, most existing models are trained on culturally homogeneous datasets, often overlooking significant variations in how emotions are expressed and perceived across different cultu...
The advent of quantum computing marks a pivotal shift in the landscape of information security, with the potential to render widely adopted cryptographic systems such as RSA and Elliptic Curve Cryptography (ECC) obsolete. This paper investigates the profound implications of quantum computing on existing encryption standards, drawing from recent adv...
Speech Emotion Recognition (SER) has become a pivotal area in human-computer interaction, aiming to equip machines with the ability to discern human emotions through speech. Traditional methods often rely on handcrafted features, which may not capture the intricate patterns of emotional expression. This study explores the integration of Mel-Spectro...
Emotion detection is a fundamental component of affective computing, with widespread applications in human-computer interaction, mental health monitoring, and intelligent virtual assistants. While unimodal approaches relying on either text, audio, or facial expressions have made significant strides, they often fall short of capturing the complexity...
The integration of Federated Learning (FL) and Blockchain technology presents a promising approach to address privacy and security challenges in e-health data sharing within smart healthcare systems. This article explores the synergistic potential of combining FL's decentralized data processing with Blockchain's immutable and transparent ledger to...
Glomerular diseases are diagnostically complex due to their diverse clinical presentations and underlying etiologies. The diagnostic process begins with a detailed patient history and physical examination, focusing on signs and symptoms indicative of glomerular pathology. Essential laboratory evaluations include urinalysis, emphasizing proteinuria...
In today's dynamic fashion retail landscape, data-driven merchandising has emerged as a critical strategy for maintaining competitiveness and meeting rapidly evolving consumer demands. This paper explores the integration of business analytics into fashion merchandising to optimize inventory management, pricing strategies, trend forecasting, and cus...
Gender equality remains a crucial global concern, and in the context of the Middle East, it emerges as both a complex challenge and a strategic opportunity. This article examines the multifaceted landscape of gender equality across Middle Eastern societies by analyzing cultural, legal, political, and economic barriers while highlighting reformative...
Modern regulatory requirements demand organisations maintain complete transparency and precise trackability of data pipelines, which mainly apply to Extract Transform Load (ETL) operations. Data provenance management and lineage need proper control to produce reliable regulatory reports that withstand inspections from GDPR and BCBS 239 and HIPAA an...
SQL Injection (SQLi) persists as a major threat to .NET applications since attackers can inject harmful SQL code into databases for database manipulation purposes. The presence of this vulnerability leads to hackers gaining access to unauthorized data and causing system integrity failure while resulting in lost data which threatens organizations ut...
Gender equality remains a crucial global concern, and in the context of the Middle East, it emerges as both a complex challenge and a strategic opportunity. This article examines the multifaceted landscape of gender equality across Middle Eastern societies by analyzing cultural, legal, political, and economic barriers while highlighting reformative...
Loneliness among adults has emerged as a significant public health concern, especially in increasingly digitized and socially fragmented societies. With technological advancements in artificial intelligence (AI), the development of emotionally responsive AI companions presents a promising avenue for mitigating the adverse effects of loneliness. Thi...
Loneliness is a growing concern among middle-aged adults, often exacerbated by lifestyle changes, career stress, family transitions, and digital-era isolation. As social connection becomes increasingly mediated through technology, artificial intelligence (AI)-based social support systems-such as intelligent chatbots, virtual companions, and emotion...
Drilling operations in general, maybe in oil and gas industry in particular give rise to large volumes of waste products such as drilling fluids, cuttings, among others. These wastes are also dangerous to the environment as they may pollute ground water, affect soil and also disrupt ecosystems. Energy requirement grows daily while the concern for t...
As the global population of older adults continues to rise, social isolation has emerged as a pressing public health issue, particularly in the United States and other developed nations. In response, the integration of Artificial Intelligence (AI) companions-ranging from conversational agents to socially assistive robots-has gained traction as a po...
In the modern digital ecosystem, where cyber threats have evolved in complexity, frequency, and impact, maintaining system integrity during attacks has become a mission-critical priority for organizations. This study explores how artificial intelligence (AI) and resilient data structures can be deployed as proactive defense mechanisms in high-press...
Adversarial Machine Learning (AML) has emerged as a significant concern in the field of cybersecurity, particularly as Artificial Intelligence (AI) and Machine Learning (ML) become increasingly integrated into critical systems. AML involves the strategic manipulation of input data to deceive ML models, leading to incorrect outputs and, ultimately,...
The paradigm of serverless data engineering lets organizations perform data management along with analysis and processing through infrastructure without any maintenance responsibilities. Deciding to implement cloud-based serverless platforms delivers enhanced scalability together with cost-efficiency and operational agility to enterprises. Serverle...
The rapid advancement of quantum computing technology poses an existential threat to contemporary cryptographic schemes, particularly those underpinning authentication protocols. These protocols, which currently rely heavily on the mathematical complexity of classical cryptographic primitives, face potential vulnerabilities in the post-quantum era...
The proliferation of artificial intelligence (AI) has transformed not only defensive cybersecurity practices but also the offensive capabilities of threat actors. Among the most alarming advancements is the application of AI in the discovery and exploitation of zero-day vulnerabilities-flaws unknown to software vendors and, therefore, unpatched. Th...
The rapid evolution of artificial intelligence (AI) has brought about transformative advancements across various sectors, but it has also introduced new challenges in the realm of cybersecurity. AI-powered cybercrime, characterized by increasingly sophisticated, automated, and adaptive attacks, poses unique ethical and legal dilemmas. This article...
The evolution of ransomware from crude, indiscriminate attacks to highly sophisticated, targeted campaigns is now being accelerated by the integration of Artificial Intelligence (AI). AI-powered ransomware represents a formidable advancement in cybercrime, with capabilities that enable intelligent target profiling, adaptive negotiation strategies,...
The advent of quantum computing promises significant advancements across various sectors, but it also presents a formidable challenge to the traditional encryption methods that have long been the cornerstone of data security. As quantum computers evolve, they have the potential to render current cryptographic protocols obsolete, posing risks to sen...
Understanding root canal morphology is critical for successful endodontic treatment. Machine learning (ML) models provide automated and precise analysis of root canal anatomy using imaging datasets, reducing diagnostic errors and improving treatment planning. This article evaluates various ML approaches and their effectiveness in morphologic classi...
Machine learning (ML) systems, particularly deep learning models, have seen widespread adoption across various industries, including healthcare, finance, and autonomous systems. Despite their impressive performance, these models are vulnerable to adversarial attacks-carefully crafted perturbations to input data that mislead ML systems into making i...
Systemic health conditions, including diabetes, cardiovascular diseases, and immunocompromised states, may affect healing and success rates of periapical surgery. This review explores the correlation between systemic disorders and postoperative outcomes, emphasizing the need for tailored perioperative management to enhance prognosis in affected pat...
The sociocultural factors impacting on fertility behavior among the Yoruba of Nigeria were investigated in a sample of 330 women, 199 from Ife-Ife urban area and 131 from 3 rural villages also in the Oranmiyan Local Government Area. All study participants were Yoruba women married to Yoruba men who had at least 1 child; their mean age was 34.5 year...
This study was conducted to evaluate the feeding value of fungi treated Jatropha curcas kernel cake on feed intake, weight gain /loss , digestibility coefficient and blood parameters of West African dwarf goat. Five diets were formulated with diet A (control, without Jatropha curcas kernel cake); B (50% Penicillium treated Jatropha curcas kernel ca...