Blessing Akogwu

Blessing Akogwu
Sheda Science and Technology Complex (SHESTCO) | SHESTCO · Applied mathematics Simulation advanced research center

About

5
Publications
456
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
18
Citations
Citations since 2016
4 Research Items
18 Citations
2016201720182019202020212022051015
2016201720182019202020212022051015
2016201720182019202020212022051015
2016201720182019202020212022051015
Introduction
Skills and Expertise

Publications

Publications (5)
Article
Full-text available
In this work, Differential Transform Method (DTM) was employed to obtain the series solution of the SIRV COVID-19 model in Nigeria. The validity of the DTM in solving the model was validated by Maple 21's Classical fourth-order Runge-Kutta method. The comparison between DTM and Runge-Kutta (RK4) solutions was performed and there was a good correlat...
Article
The Internet of things (IoT) has made it possible for health institutions to have remote diagnosis, reliable, preventive and real-time decision making. However, the anonymity and privacy of patients are not considered in IoT. Therefore, this paper proposes a blockchain-based anonymous system, known as GarliMediChain, for providing anonymity and pri...
Article
Full-text available
—Internet of medical things (IoMT) has made it possible to collect applications and medical devices to improve healthcare information technology. Since the advent of the pandemic of coronavirus (COVID-19) in 2019, public health information has become more sensitive than ever. Moreover, different news items incorporated have resulted in differing pu...
Article
Full-text available
Network forensics have emerged as important procedures for collecting, analyzing, reporting, and documenting of critical situations that requires real-time investigation of network attack and evidence acquisition for decision making processes. Investigating network attack is a contemporary challenging issue. A vital number of several network attack...

Network

Cited By