Rashidah Funke Olanrewaju

Rashidah Funke Olanrewaju
Nasarawa State University · Computer Science

About

179
Publications
202,407
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,307
Citations

Publications

Publications (179)
Conference Paper
Abstract: Malaria, caused by Plasmodium parasites and transmitted by infected female Anopheles mosquitoes, is still a major worldwide health problem. Millions of people are affected by the disease, which causes life-threatening symptoms and can be deadly in tropical locations. Effective malaria prevention and treatment need early and precise identi...
Article
Full-text available
The paper presents a simplified yet innovative computational framework to enable secure routing for sensors within a vast and dynamic Internet of Things (IoT) environment. In the proposed design methodology, a unique trust evaluation scheme utilizing a modified version of Ant Colony Optimization (ACO) is introduced. This scheme formulates a manifol...
Article
Full-text available
Malaria is the leading cause of death in the African region. Data mining can help extract valuable knowledge from available data in the healthcare sector. This makes it possible to train models to predict patient health faster than in clinical trials. Implementations of various machine learning algorithms such as K-Nearest Neighbors, Bayes Theorem,...
Article
Full-text available
bstract: Malaria disease is the number one cause of death all over the Sub-Sahara world. Data mining can help extract valuable knowledge from available data in the healthcare sector. This allows training a patient health prediction model faster than in a clinical trial. Various implementation of machine learning algorithms such as Bayesian Theorem,...
Article
Full-text available
Malaria, a potentially fatal condition brought on by Plasmodium parasites, continues to be a major worldwide health concern. Millions of individuals across the globe, especially in tropical and subtropical areas, are afflicted by the illness, which is spread by the bites of female Anopheles mosquitoes that have been infected. The malaria incidence...
Article
Full-text available
Malaria disease impose risk to human life and health status. In this paper, a historical background of some of the existing applications of ICT to predicting Malaria Disease is presented. Many organizations globally are involved in campaigning for reducing Malaria disease and equally controlling it. Almost all these efforts are focused on control a...
Article
Full-text available
The inclusion of mobility-based Internet-of-Things (IoT) devices accelerates the data transmission process, thereby catering to IoT users’ demands; however, securing the data transmission in mobility-based IoT is one complex and challenging concern. The adoption of unified security architecture has been identified to prevent side-channel attacks in...
Article
Full-text available
Mobile ad hoc networks are susceptible to various security threats due to their open media nature and mobility, making them a top priority for security measures. This paper provides an in-depth examination of MANET security issues. Some of the most critical aspects of mobile ad hoc networks, including their applications, have been discussed. This i...
Article
Full-text available
Sales enablement sensing-as-a-service (SESaaS) is an organisation’s future process management for any sales management operation. With an expanding base of dynamic customer demands and the adoption of multiple technological advancements, there is a high possibility that human-centric sales management will be transformed into a fully automated form...
Article
Full-text available
span>Augmented reality (AR) applications have become increasingly ubiquitous as it integrates virtual information such as images, 3D objects, video, and more to the real world, which further enhances the real environment. Many researchers have investigated the augmentation of the 3D object on the digital screen. However, certain loopholes exist in...
Article
Full-text available
With the rapid advancement of technologies and proliferation of intelligent devices, connecting to the internet challenges have grown manifold, such as ensuring communication security and keeping user credentials secret. Data integrity and user privacy have become crucial concerns in any ecosystem of advanced and interconnected communications. Cryp...
Article
Full-text available
With the improvements in machine-to-machine (M2M) communication, ubiquitous computing, and wireless sensor networks, the Internet of Things (IoT) has become a notion that is constantly rising in importance. Using uniquely addressable IDs, the Internet of Things links diverse physical items and allows them to communicate with one another through the...
Article
Full-text available
Augmented reality (AR) applications have become increasingly ubiquitous as it integrates virtual information such as images, 3D objects, video, and more to the real world, which further enhances the real environment. Many researchers have investigated the augmentation of the 3D object on the digital screen. However, certain loopholes exist in the e...
Article
Full-text available
By and large, authentication systems employed for web-based applications primarily utilize conventional username and password-based schemes, which can be compromised easily. Currently, there is an evolution of various complex user authentication schemes based on the sophisticated encryption methodology. However, many of these schemes suffer from ei...
Article
Full-text available
According to World Health Organization (WHO) report an estimated 17.9 million lives are being lost each year due to cardiovascular diseases (CVDs) and is the top contributor to the death causes. 80% of the cardiovascular cases include heart attacks and strokes. This work is an effort to accurately predict the common heart diseases such as arrhythmi...
Article
Full-text available
Mobile Adhoc Network (MANET) has been a core topic of research since the last decade. Currently, this form of networking paradigm is increasingly being construed as an integral part of upcoming urban applications of Internet-of-Things (IoT), consisting of massive connectivity of diverse types of nodes. There is a significant barrier to the applicab...
Article
Full-text available
The Mobile Ad-Hoc Network (MANET) incorporates a collaborative networking scenario, where dynamic host movement results in frequent topology changes. In MANET, nodes cooperate during route establishment, and the data packet must travel from source to destination through multi-hop intermediate links. The nodes in a MANET can be localized in a restri...
Article
Full-text available
The current era of smart computing and enabling technologies encompasses the Internet of Things (IoT) as a network of connected, intelligent objects where objects range from sensors to smartphones and wearables. Here, nodes or objects cooperate during communication scenarios to accomplish effective throughput performance. Despite the deployment of...
Article
Full-text available
The progressively ubiquitous connectivity in the present information systems poses newer challenges to security. The conventional security mechanisms have come a long way in securing the well-defined objectives of confidentiality, integrity, authenticity and availability. Nevertheless, with the growth in the system complexities and attack sophistic...
Article
Full-text available
Currently, Mobile Ad hoc Networks (MANETs) have evolved as one of the essential next-generation wireless network technologies. MANET comprises of mobile nodes that are self-configurable, and every mobile node behaves as a router for every other node allowing data to move by making use of multi-hop network routes. MANETs signify a networking class t...
Article
Full-text available
Nowadays, artificial intelligence applications invade all of the fields including medical applications field. Deep learning, a subfield of artificial intelligence, in particular, Convolutional Neural Networks (CNN), have quickly become the first choice for processing and analyzing medical images due to its performance and effectiveness. Diabetic re...
Article
Full-text available
A paradigm shift in health system did intensify the need for research on wearable electronics. There are numerous reasons that could lead to skin ulcers. The most common are lesion due to constant pressure, incontinence control, excessive humidity and postural changes. Over the years, there have been numerous interventions ranging from specific ski...
Conference Paper
Full-text available
General energy resources utilisation was subjected to a techno-Islamic analysis within natural constraints. Based on their utilisation rate to formation rate ratio, energy sources can either be renewable or non-renewable. It was discovered that man has been recklessly utilising non-renewable energy resources for several centuries more than the rene...
Chapter
Full-text available
The exponential growth observed as well as predicted in the development and deployment of the Internet of Things (IoT) based applications in every walk of our life brings forth the mandatory requirement of the secure communication system which is seamless yet effective in the highly heterogeneous and resource-constrained network. The core philosoph...
Chapter
A growing trend exerted by current users in accessing sensitive data and performing critical data exchanges predominantly highlights the proliferation usage of mobile phone devices by users for accessibility. There exists a demand for a security solution capable of thwarting the existing threats while offering extended support, at the same time con...
Article
Full-text available
Access to sustainable finance is essential to accessing sustainable livelihood, and basic human needs-food, clothing and shelter. Despite its high positive impact on economic growth, the 2018 Global Findex report indicates that many of the 57 IDB-member countries recorded relatively meagre financial inclusion rates. Consequently, the primary resear...
Poster
Here, we propose a system architecture and design procedure for Pressure Ulcer intervention that integrates active pressure mapping, electrical stimulation with antimicrobial materials on a fabric overlay.
Article
Full-text available
Game Theory is a useful tool for exploring the issues concerning Mobile Ad-Hoc Network (or MANET) security. In MANETs, coordination among the portable nodes is more significant, which encompasses their vulnerability challenges to several security assaults and the inability to run securely, when storing its resources and manage secure routing betwee...
Chapter
Full-text available
Game Theory acts as a suitable tool offering promising solutions to security-related concerns in Mobile Ad Hoc Networks (i.e., MANETs). In MANETs, security forms a prominent concern as it includes nodes which are usually portable and require significant coordination between them. Further, the absence of physical organisation makes such networks sus...
Article
Internet-banking is a crucial service offered by financial Institutions and has gained popularity at a high pace. Owing to the increasing usage of this service, it is being frequently targeted by adversaries. The login process by the user is one of the main points that are at risk of this assault. Hence, a robust security mechanism is essential for...
Article
Full-text available
Applications meant for exchanging cash, or individual data are becoming progressively common in mobile communications and on the Internet. The expansion of electronic banking services by utilizing various electronic channels provide added value to the users. As such, client authentication is required in these applications for affirming the legitima...
Article
The applications based on IoT are ubiquitous in providing passive user involvement on the collective approach of sensor technology, embedded system, networking and communication convergence with analytical computing. The application framework of IoT comprises of devices that are highly heterogeneous and compute migrations from sensor to IoT gateway...
Conference Paper
Numerous applications are available on the Internet for the exchange of personal information and money. All these applications need to authenticate the users to confirm their legitimacy. Currently, the most commonly employed credentials include static passwords. But people tend to behave carelessly in choosing their passwords to avoid the burden of...
Article
Full-text available
In next-generation wireless networks, a Multi-Mode Device (MMD) can be connected with available Radio Access Technology (RAT) in a Heterogeneous Wireless Network (HWN). The appropriate RAT selection is essential to achieve expected Quality of Service (QoS) in HWN. There are many factors to select an appropriate RAT in HWN including Data rate, Power...
Article
Full-text available
In next-generation wireless networks, a user can be connected through Multi-Mode Device (MMD) to the multiple wireless networks in Heterogeneous Wireless Networks (HWN) considering several factors; including network technology, data service type, available bandwidth, Quality of Service (QoS), monetary cost, etc. To deal with all these multi attribu...
Article
Full-text available
Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are self-configuring networks of mobile devices that are joined using wireless channels. These represent convoluted distributed systems comprising of wireless mobile nodes which are free to move and self-organise dynamically into temporary and arbitrary, ad hoc top...
Conference Paper
Full-text available
The demands of a higher degree of security level for the mobile ad-hoc network are yet to meet the best solution. Owing to the dynamic topology and decentralization issue, the mobile node suffers from a consistent security problem during communication stage. This paper has reviewed the existing system towards secure routing in mobile ad-hoc network...
Article
Full-text available
In Heterogeneous Wireless Network (WHN), a Mobile Device (MD) can be connected with multiple access technologies available in a particular geographical area. Selection of appropriate access technology is a challenge for the MD where game theory policy can be applied. Shapley Value is one of the game-theoretic models that can be applied to allocate...
Article
Full-text available
Bandwidth aggregation in heterogeneous wireless networks (HWN) can be one of the effective solutions in providing quality data transmission for real-time applications. However, transmitting the data through multiple networks create packet reordering issues that result in transmission delay and degrades the overall quality of services. This paper ad...
Article
Full-text available
Lung cancer is the most common cancer worldwide and the third most common cancer in Malaysia. Due to its high prevalence worldwide and in Malaysia, it is an utmost importance to have the disease detected at an early stage which would result in a higher chance of cure and possibly better survival. The current methods used for lung cancer screening m...
Article
Full-text available
Urban people minimize shopping time in daily life due to time constrain. From that point of view, the concept of supermarket is being popular while consumers can buy different items from same place. However, customer spends hours and hours to find desired items in a large supermarket. In addition, it's also required to be queued during payment at c...