
Samuel OmajiEdo State University Iyamho
Samuel Omaji
Doctor of Philosophy (PhD)
Looking for postdoctoral position and research collaborators in areas of artificial intelligence and blockchain
About
34
Publications
9,931
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
376
Citations
Introduction
I received my Bachelor degree in Statistics/Computer Science from the University of Agriculture Makurdi, Nigeria in September 2009. Then completed my Master programme in Information Security from COMSATS University, Islamabad, Pakistan in July 2015. As TWAS scholar, I received my PhD degree in Computer Science from COMSATS University, Islamabad, Pakistan in 2021.
Currently, I am with the Department of Mathematics and Computer Science, Edo State University, Uzairue.
Skills and Expertise
Additional affiliations
August 2021 - present
Confluence University of Science and Technology, Osara
Position
- Head of Faculty
Education
September 2017 - June 2021
Publications
Publications (34)
The Internet of things (IoT) has made it possible for health institutions to have remote diagnosis, reliable, preventive and real-time decision making. However, the anonymity and privacy of patients are not considered in IoT. Therefore, this paper proposes a blockchain-based anonymous system, known as GarliMediChain, for providing anonymity and pri...
This paper proposes a blockchain based trust management method for agents in a multi-agent system (MAS). In this work, three objectives are achieved: trust, cooperation and privacy. The trust of agents depends on the credibility of trust evaluators, which is verified using the proposed methods of trust distortion, consistency and reliability. To en...
In this paper a secure energy system is proposed that consists of private and public blockchains for vehicles in sustainable cities and society. The former protects vehicle owners from spatial and temporal information based attacks while the latter provides efficient energy trading in sustainable cities and society. In the proposed system, the dyna...
—Internet of medical things (IoMT) has made it possible to collect applications and medical devices to improve healthcare information technology. Since the advent of the pandemic of coronavirus (COVID-19) in 2019, public health information has become more sensitive than ever. Moreover, different news items incorporated have resulted in differing pu...
A smart energy management controller can improve energy efficiency, save energy costs, and reduce carbon emissions and energy consumption while accurately catering to consumer consumption habits. Having integrated various renewable energy systems (RESs) and a battery storage system (BSS), we proposed an optimization-based demand-side management (DS...
In this study, a secure and coordinated blockchain based energy trading system for Electric Vehicles (EVs) is presented. The major goals of this study are to provide secure and efficient energy trading between EVs and Charging Stations (CSs), and to ensure efficient coordination between EVs. In this study, a consortium blockchain based energy tradi...
This paper proposes a secure blockchain based energy trading system for residential homes. In the system, a new proof-of-computational closeness (PoCC) consensus protocol is proposed for the selection of miners and the creation of blocks. Moreover, an analytical energy pricing policy is designed to solve the problem of existing energy pricing polic...
This thesis examines the privacy preserving energy management issue, taking into account both energy generation units and responsive demand in the smart grids. Firstly, because of the inherent stochastic behavior of the distributed energy resources, an optimal energy management problem is studied. Distributed energy resources are used in the decent...
Privacy Aware Energy Management in Smart Communities by Exploiting Blockchain (PhD Synopsis Presentation).
Privacy Aware Energy Management in Smart Communities by Exploiting Blockchain (PhD Thesis Presentation).
This paper proposes a blockchain system, known as GarliChain, to solve the problems of anonymity and privacy of consumers during energy trading in the smart grids. It is inspired by both garlic routing and consortium blockchain. In the GarliChain, identity based encryption is used to encrypt the messages of consumers twice before transmitting them...
In today's smart community, smart grids (SGs) have emerged as a promising solution to the future generation of the power system. In SG, smart meters automatically collect and act on information such as the behavior of consumers and suppliers. The information collected is used to improve the efficiency, reliability and sustainability of the distribu...
Multi-microgrid (MMG) system is a new method that concurrently incorporates different types of distributed energy resources, energy storage systems and demand responses to provide reliable and independent electricity for the community. However, MMG system faces the problems of management, real-time economic operations and controls. Therefore, this...
This paper combines additive homomorphic encryption and consortium blockchain
technology to provide privacy and trust. Additionally, a dynamic energy pricing model is formulated based on the demand response ratio (DRR) of the load demand of prosumers to address fixed energy pricing problems. The proposed dynamic pricing model includes demurrage fee...
The International Energy Agency has projected that the total energy demand for electricity in sub-Saharan Africa (SSA) is expected to rise by an average of 4% per year up to 2040. It implies that ~620 million people are living without electricity in SSA. Going with the 2030 vision of the United Nations that electricity should be accessible to all,...
Over the last decades, load forecasting is used by power companies to balance energy demand and supply. Among the several load forecasting methods, medium-term load forecasting is necessary for grid’s maintenance planning, settings of electricity prices, and harmonizing energy sharing arrangement. The forecasting of the month ahead electrical loads...
During the process of charging, electric vehicle’s location is usually revealed when making payment. This brings about the potential risk to privacy of electric vehicle. We observe that the trade information recorded on blockchain may raise privacy concern and therefore, we propose a blockchain oriented approach to resolve the privacy issue without...
During the process of charging, electric vehicle's location is usually revealed when making payment. This brings about the potential risk to privacy of electric vehicle. We observe that the trade information recorded on blockchain may raise privacy concern and therefore, we propose a blockchain oriented approach to resolve the privacy issue without...
The emergence of smart homes appliances has generated a high volume of data on smart meters belonging to different customers which, however, can not share their data in deregulated smart grids due to privacy concern. Although, these data are important for the service provider in order to provide an efficient service. To encourage customers particip...
This paper addresses the challenges of load forecasting that occur due to the complex nature of load in different predicting horizons and as well as the total consumption within these horizons. It is not often easy to accurately fit the several complex factors that are faced with demand for electricity into the predicting models. More so, due to th...
Presently, power systems have the capacities to accommodate different framework for incorporating economic dispatch, transmission, storage, and electricity consumption. This can provide an efficient energy management for controlling, coordinating, planning and operations. This paper focuses on coordinating the behaviors of a typical energy manageme...
Presently, the advancements in the electric system, smart meters, and implementation of renewable energy sources (RES) have yielded extensive changes to the current power grid. This technological innovation in the power grid enhances the generation of electricity to meet the demands of industrial, commercial and residential sectors. However, the in...
This paper presents a model for optimal energy management under the time-of-use (ToU) and critical peak price (CPP) market in a microgrid. The microgrid consists of intermittent dispatchable distributed generators, energy storage systems, and multi-home load demands. The optimal energy management problem is a challenging task due to the inherent st...
In this paper, we presented JAYA algorithm which is a recently developed scheme that do not need any specific parameter to be adjusted except the known control parameters. To achieve the set of objectives like: electricity bill minimization, peak to average ratio (PAR) reduction, minimum user dissatisfaction , a proposed JAYA energy management cont...
In this paper, we study challenges of electricity consumption management in smart grid, and focus on the different impact of operational time intervals of appliances to ascertain if consumer's comfort can be maximized. The appliance execution process is built on continuous cycle parts, having a demand power rating with objective of obtaining a mini...
This paper provide an automated way of correlAt-
ing intruSion Evidence fRom hoNEypot and neTwork
(ASERNET). With this evidence, electronic feeds can
be provided to organizations for protecting their re-
sources.
To learn more about attack pattern and attacker behaviour, the concept of electronic
baits such as network resources, computer, routers, switches deployed to be probed,
attacked and compromised are used in the area of information technology (IT) security
under the name honeypot. These electronic baits lure in attackers and help in
assessment of vul...
Network forensics have emerged as important procedures for collecting, analyzing, reporting, and documenting of critical situations that requires real-time investigation of network attack and evidence acquisition for decision making processes. Investigating network attack is a contemporary challenging issue. A vital number of several network attack...
Location aware devices are used extensively in many networking systems such as car navigation, IP
traceback, the collected spatio-temporal data capture the detected movement information of the tagged objects, offering tremendous opportunities for data mining of useful knowledge.
Questions
Questions (4)
Dear all,
I am working on the cost assessment of solar home system (SHS) for developing countries (precisely Africa). This cost parameter will help me in computing the levelized cost of energy. The dataset should contain current assets and current liabilities. Your suggestions and contributions are highly appreciated.
Thanks
I am currently doing research on blockchain, specifically the ethereum blockchain. I will be grateful to know the other input parameter(s) and how to calculate the gas consumption, throughput and commit delay. Links and existing work will be highly appreciated.
I will like to know how can someone compute the active, reactive and voltage stability index of 30-bus distribution system to get the following prediction horizons: daily, weekly and monthly.
Matlab code will be preferable?
Greetings all.
I am trying to find the suitable solution to solve the MDP which has extreme of a functional and does not have any analytic solution. Although, Bellman equation solved the approximate dynamic programming (ADP) that addressed the above problem. However are there any other methods to serve as the alternative to ADP?
Projects
Projects (2)
The main aim of this project is to share CFP and contribute in the field of networks, information security, and machine learning with friends, colleagues, and collaborators.
We identify certain attributes that are
common in the two datasets and then use it to link several other attributes. We use the notion of surjective mapping to
construct our proposed algorithm which reduces duplication in the aggregated data. Our method leads to a semi-automated
network forensic data correlation which is feasible without losing the key information. Our experiment also indicates that
forensics correlation is more effective when traces of intrusion are gathered from multiple sensors and analysed. Further,
using the data mining technique on the correlated dataset we are able to create Snort rules which help in avoiding specific
threats in future.