Njideka Mbeledogu

Njideka Mbeledogu
Nnamdi Azikiwe University | Unizik · Department of Computer Sciences

PhD

About

42
Publications
15,584
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
110
Citations

Publications

Publications (42)
Article
Full-text available
Attendance is one of the most important elements of any educational institution because it explains the academic performance of a student and in relation to the NUC benchmark of 75% policy, it states the exact students and number that are eligible to write an examination thereby, acting as a guide in producing question paper. Based on these, a good...
Book
Full-text available
Approximately three hundred stratified IT-Information Technology managers and professionals from selected industries, government agencies, colleges and universities completed a Modified Attributional Style Questionnaire-MASQ. This instrument was aimed specifically at examining attributions for work related events especially in IT. Respectively, a w...
Article
Full-text available
This study examines computer application in materials management and inventory control system. Second, to determine the database input and outputs of the inventory control application; the type of data processing system used and to draw the general diagram of the application and to write the FORTRAN Program of the E.O.Q model. The research design w...
Article
The presence of outliers has deleterious effects on the stock value because the unreliable information may discourage investors from investing in the stock. This associated problem paved way for the importance of intelligent prediction paradigm. However, existing stock forecasting models like Artificial neural network (ANN) performed better than tr...
Article
Many online platform’s participants are worried about hate speeches that usually trigger cyberbully attitudes that dissuades users’ interest in their platforms. The study investigates hate speech in online platforms using Natural Language Processing (NLP) techniques and supervised machine learning paradigm. It specifically focused on developing a r...
Article
Full-text available
The use of photovoltaic energy systems as an alternative energy source is growing in popularity. The stand-alone PV system must continue to function at its peak level in order to efficiently harness reliable energy. This requires continuous maintenance and monitoring. An intelligent self-diagnostic model for monitoring PV system is needed, neverthe...
Chapter
Full-text available
The norm in the design of epidemic agent-based models (ABM) for communication networks is to represent only the parameters of propagation and control for a particular malware infection. However, nothing is said about the transmission of data packets, i.e., the routing protocols in such models. Most likely, this trend originated from the design of A...
Article
Full-text available
People interact with multimedia every day: reading books, watching television, listening to music, watching movies, and conducting research. We organize and structure this multimedia, so that we can easily access it again. We create photo albums of our holidays and occasions, we keep track of compact discs and tapes with the music we like, we store...
Article
Full-text available
The essentiality of wireless sensor networks (WSNs) in military and health applications cannot be overemphasized, and this has made these tiny sensors soft targets for malware attacks. However, with the ubiquity of single-group infection models, few researchers have studied the effects of many concurrent infection types on WSNs. Therefore, we propo...
Article
Full-text available
The renowned orientations of cultural models proposed by Hall and Hofstede has been the subject of criticisms. This is due to the weak, inflexible and old-fashioned nature of some designs resulting from them. In addition, is the ever-changing, formless and undefined nature of culture and globalization. Consequently, these vituperations have resulte...
Article
Full-text available
The propagation of malicious codes such as worms have been characterized using compartmental epidemic models which are mostly mathematical equations. Aside the challenge of identifying the type of virus or worm represented by these compartmental models, we noticed that the representation of internet protocol (IP) address space is absent. Therefore,...
Article
Full-text available
This work investigates empirically the impact of political party control over its candidates or vice versa on winning an election using a natural language processing technique called sentiment analysis (SA). To do this, a set of 7430 tweets bearing or related to #AnambraDecides2017 was streamed during the November 18, 2017, Anambra State gubernator...
Article
Full-text available
Ghost worker syndrome has been a menace across all tiers of government. It has led government into spending billions of money resulting from funds siphoned through payments of non-existing employees. This paper develop a system that uses biometric and National Identification in detecting ghost workers and also detecting double employment. The probl...
Preprint
Full-text available
This work investigates empirically the impact of political party control over its candidates or vice versa on winning an election using a natural language processing technique called sentiment analysis (SA). To do this, a set of 7430 tweets bearing or related to #AnambraDecides2017 was streamed during the November 18, 2017, Anambra State gubernator...
Article
Full-text available
Recently, researchers have identified several challenges attendant to the teaching and learning of Geography in Nigerian secondary schools. Consequently, in order to address these issues we propose GeoNaija-an educational mobile application platform that aid the teaching and learning of Geography. For the development of the application, we employed...
Poster
Full-text available
T o w a r d s c o m p l e m e n t i n g r e f o r m a t i v e Future Work • Perform qualitative research using technology acceptance models • Evaluate the Impact of the created videos on prisoner behaviour •Create more videos with good themes Overview •Nigerian Prisons Service (NPS) is part of the Criminal Justice System. NPS is aimed at incapacit...
Conference Paper
Full-text available
Instituting an initiative called Project Mgbanwe; we proposed the use of digital video education approach to complement other Nigerian Prison Service (NPS)’s reformation programmes and to promote positive behavioral change amongst offenders. This project was inspired by several issues, which include low turnout/enrollment of inmates for formal and...
Conference Paper
To have a sustainable society which is crime-free, it has become very necessary to enhance the correctional and reformative/rehabilitative outlook of an under-resourced and underrepresented institution like Nigerian Prisons Service (NPS), filled with offenders who are not only undeserving due to their alleged crimes but illiterate and of low income...
Article
Full-text available
Sensor networks are appealing targets for malicious attacks that invade the network with the aim of depleting the confidentiality, availability and integrity (CIA) features/parameters of neighboring sensor nodes. This is due to its open communication, minimal resources and its deployment in un-trusted, unguarded and unfriendly terrains. To restrict...
Conference Paper
Full-text available
Motivated by the uniqueness of the African culture we took an intellectual trip through some topical HCI discourses in order to highlight areas amenable to flexible abstractions using the Agent-based modeling/Multi agent systems (ABM/MAS). We identified issues arising from “Social computing” in both Embodied Interaction and CSCW and “Reassessing cu...
Conference Paper
Full-text available
The emergence of malicious codes that attack Wireless Sensor Networks (WSN) made it necessary to direct research attention to security. These attacks arising from worms pose devastating threats to networks which can lead to substantial losses or damages. However, recent models developed for the purpose of understanding worm transmission patterns an...
Article
Full-text available
Forecasting the price movements in stock market has been a major challenge for common investors, businesses, brokers and speculators because Stock Prices are considered to be very dynamic and susceptible to quick changes. As more and more money is being invested, the investor gets anxious of the future trends of the stock prices in the market and t...
Article
Full-text available
The work focused on measuring the forecasting accuracy in the demand of the crude oil products in masters Energy Oil and Gas. Data of the products were collected covering a period of three years of monthly product demand. Forecasting accuracy models were used to measure and to analyze the accuracy of the forecast. Time series decomposition analyses...
Article
Full-text available
In farming, irrigation is a very indispensable factor. Most farmers apply irrigation by manual means which is effective for small scale farming. But the larger the farmland, the greater the need for a better means of irrigation, hence, an automated irrigation system. This paper discusses the design and implementation of an Intelligent Microcontroll...
Article
Full-text available
This work study the capital expenditure variables for optimization of the response. Partial least square method was used to optimize the variables of the capital expenditure.
Article
Full-text available
Productivity improvement in small and medium scale enterprise will develop both the economic condition and the industry on its side. During these research operation research techniques where employed to Golden plastic industry limited (GPIL) and a linear programming technique was used in maximizing profit. Productivity therefore improve by applying...
Article
Full-text available
The aim of this research is to ascertain how well the capital budget has been implemented. The use of Pearson correlation, Spearman's rho correlation and Kendall's tau b correlation were made to show the challenges facing budget implementation and the way forward. Introduction Governance entails proper and efficient management of the available reso...
Article
Full-text available
The research work is to study the queuing system in Shoprite shopping plaza in Enugu State. The technique used for the analysis is an infinite single-line multiple channel technique. The used of the existing single-line multiple-channel models were absolved to analysis the data. From the result, it was observed that the number of servers needed to...
Article
Full-text available
The researcher applied time series decomposition analysis to analyze the production demand in millennium plastic industry using historical data. The data were collected and arranged for both monthly and quarterly to understand the current status of the production demand. The data were analyzed using time series decomposition analysis to see if the...
Article
Full-text available
The problem with the current system of budgeting in most states in Nigeria is the little or no involvement of the masses in making budget decisions. In addition the use of the manual system of budget allocation is characterized by delays in overall administrative operations and unavoidable human error. Decision makers allocate resources to various...
Article
Full-text available
One of the major drawbacks of traditional computing is that it casts business processes in concrete, in other words in hard-to-change hardware and software. By modularizing systems into client and server portions, new technology and new software components can be added more easily without affecting the rest of the system, as well as altering the us...
Conference Paper
Full-text available
Reducing the dimensionality of feature vector is the most direct way to solve the problems caused by high feature dimensionalities. This is normally achieved in feature extraction step in data mining or pattern recognition system. The main task of feature extraction is to select or combine the features that preserve most of the information and remo...

Network

Cited By