About
13
Publications
15,104
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
76
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (13)
Preeclampsia is a significant complication in pregnancy characterized by high blood pressure and damage to organs, posing serious risks to both the mother and fetus. Early prediction and management are crucial for improving outcomes. In Nigeria, where healthcare resources are often limited, and prenatal care access can be uneven, advanced predictiv...
In machine learning, the intelligence of a developed model is greatly influenced by the dataset used for the target domain on which the developed model will be deployed. Social media platform has experienced more of hackers’ attacks on the platform in recent time. To identify a hacker on the platform, there are two possible ways. The first is to us...
Social media platform has greatly enhanced human interactive activities in the virtual community. Virtual socialization has positively influenced social bonding among social media users irrespective of one’s location in the connected global village. Human user and social bot user are the two types of social media users. While human users personally...
We live in a virtual world where actual lifestyles are replicated. The growing reliance on the use of social media networks worldwide has resulted in great concern for information security. One of the factors popularizing the social media platforms is how they connect people worldwide to interact, share content, and engage in mutual interactions of...
We live in a virtual world where actual lifestyles are replicated. The growing reliance on the use of social media networks worldwide has resulted in great concern for information security. One of the factors popularizing the social media platforms is how they connect people worldwide to interact, share content, and engage in mutual interactions of...
Advancements in electronic health record system allow patients to store and selectively share their medical records as needed with doctors. However, privacy concerns represent one of the major threats facing the electronic health record system. For instance, a cybercriminal may use a brute-force attack to authenticate into a patient’s account to st...
Article History Electronic Voters Register is a key deliverable of the pre-voting stage in an E-voting system that has become a key component of governance in this 21st century. E-voting system is generally grouped into three phases: before-voting, during-voting and after-voting phase. Before-voting handles the enlistment of eligible voters into th...
Communication security deals with attributes such as confidentiality, integrity and availability. The current strategies used to achieve covertness of communication employs encryption. Encryption techniques minimize eavesdropping on the conversation between the conversing parties by transforming the message into an unreadable form. However, it does...
Electronic Voters Register is a key deliverable of the pre-voting stage in an E-voting system that has become a key component of governance in this 21st century. E-voting system is generally grouped into three phases: before-voting, during-voting and after-voting phase. Before-voting handles the enlistment of eligible voters into the voters' databa...
The cloud computing is nowadays an embracing computing technology by many organizations, academic institutions and business centers. Resources availability, resources capacity, security are among the factors that subscriber consider while rating Cloud Service Providers when subscribing. Cloud Service Providers (CSPs) are limited in some resources,...
Cloud computing has risen as a prevailing computing platform for years to come, impacting the functionality, design and deployment of applications. As cloud computing advance in prominence, it becomes a major hit for attackers and it security issue a huge concern for practitioners. These security issues have given rise to several active researches...