Samuel Omaji

Samuel Omaji
Edo State University Iyamho

Doctor of Philosophy (PhD)
Looking for postdoctoral position and research collaborators in areas of artificial intelligence and blockchain

About

34
Publications
9,931
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
376
Citations
Introduction
I received my Bachelor degree in Statistics/Computer Science from the University of Agriculture Makurdi, Nigeria in September 2009. Then completed my Master programme in Information Security from COMSATS University, Islamabad, Pakistan in July 2015. As TWAS scholar, I received my PhD degree in Computer Science from COMSATS University, Islamabad, Pakistan in 2021. Currently, I am with the Department of Mathematics and Computer Science, Edo State University, Uzairue.
Additional affiliations
August 2021 - present
Confluence University of Science and Technology, Osara
Position
  • Head of Faculty
Education
September 2017 - June 2021
COMSATS University Islamabad
Field of study
  • Computer Science

Publications

Publications (34)
Article
The Internet of things (IoT) has made it possible for health institutions to have remote diagnosis, reliable, preventive and real-time decision making. However, the anonymity and privacy of patients are not considered in IoT. Therefore, this paper proposes a blockchain-based anonymous system, known as GarliMediChain, for providing anonymity and pri...
Article
Full-text available
This paper proposes a blockchain based trust management method for agents in a multi-agent system (MAS). In this work, three objectives are achieved: trust, cooperation and privacy. The trust of agents depends on the credibility of trust evaluators, which is verified using the proposed methods of trust distortion, consistency and reliability. To en...
Article
In this paper a secure energy system is proposed that consists of private and public blockchains for vehicles in sustainable cities and society. The former protects vehicle owners from spatial and temporal information based attacks while the latter provides efficient energy trading in sustainable cities and society. In the proposed system, the dyna...
Article
Full-text available
—Internet of medical things (IoMT) has made it possible to collect applications and medical devices to improve healthcare information technology. Since the advent of the pandemic of coronavirus (COVID-19) in 2019, public health information has become more sensitive than ever. Moreover, different news items incorporated have resulted in differing pu...
Article
Full-text available
A smart energy management controller can improve energy efficiency, save energy costs, and reduce carbon emissions and energy consumption while accurately catering to consumer consumption habits. Having integrated various renewable energy systems (RESs) and a battery storage system (BSS), we proposed an optimization-based demand-side management (DS...
Article
Full-text available
In this study, a secure and coordinated blockchain based energy trading system for Electric Vehicles (EVs) is presented. The major goals of this study are to provide secure and efficient energy trading between EVs and Charging Stations (CSs), and to ensure efficient coordination between EVs. In this study, a consortium blockchain based energy tradi...
Article
Full-text available
This paper proposes a secure blockchain based energy trading system for residential homes. In the system, a new proof-of-computational closeness (PoCC) consensus protocol is proposed for the selection of miners and the creation of blocks. Moreover, an analytical energy pricing policy is designed to solve the problem of existing energy pricing polic...
Thesis
Full-text available
This thesis examines the privacy preserving energy management issue, taking into account both energy generation units and responsive demand in the smart grids. Firstly, because of the inherent stochastic behavior of the distributed energy resources, an optimal energy management problem is studied. Distributed energy resources are used in the decent...
Presentation
Full-text available
Privacy Aware Energy Management in Smart Communities by Exploiting Blockchain (PhD Synopsis Presentation).
Presentation
Full-text available
Privacy Aware Energy Management in Smart Communities by Exploiting Blockchain (PhD Thesis Presentation).
Article
Full-text available
This paper proposes a blockchain system, known as GarliChain, to solve the problems of anonymity and privacy of consumers during energy trading in the smart grids. It is inspired by both garlic routing and consortium blockchain. In the GarliChain, identity based encryption is used to encrypt the messages of consumers twice before transmitting them...
Research Proposal
Full-text available
In today's smart community, smart grids (SGs) have emerged as a promising solution to the future generation of the power system. In SG, smart meters automatically collect and act on information such as the behavior of consumers and suppliers. The information collected is used to improve the efficiency, reliability and sustainability of the distribu...
Article
Full-text available
Multi-microgrid (MMG) system is a new method that concurrently incorporates different types of distributed energy resources, energy storage systems and demand responses to provide reliable and independent electricity for the community. However, MMG system faces the problems of management, real-time economic operations and controls. Therefore, this...
Article
Full-text available
This paper combines additive homomorphic encryption and consortium blockchain technology to provide privacy and trust. Additionally, a dynamic energy pricing model is formulated based on the demand response ratio (DRR) of the load demand of prosumers to address fixed energy pricing problems. The proposed dynamic pricing model includes demurrage fee...
Article
Full-text available
The International Energy Agency has projected that the total energy demand for electricity in sub-Saharan Africa (SSA) is expected to rise by an average of 4% per year up to 2040. It implies that ~620 million people are living without electricity in SSA. Going with the 2030 vision of the United Nations that electricity should be accessible to all,...
Article
Full-text available
Over the last decades, load forecasting is used by power companies to balance energy demand and supply. Among the several load forecasting methods, medium-term load forecasting is necessary for grid’s maintenance planning, settings of electricity prices, and harmonizing energy sharing arrangement. The forecasting of the month ahead electrical loads...
Chapter
During the process of charging, electric vehicle’s location is usually revealed when making payment. This brings about the potential risk to privacy of electric vehicle. We observe that the trade information recorded on blockchain may raise privacy concern and therefore, we propose a blockchain oriented approach to resolve the privacy issue without...
Conference Paper
Full-text available
During the process of charging, electric vehicle's location is usually revealed when making payment. This brings about the potential risk to privacy of electric vehicle. We observe that the trade information recorded on blockchain may raise privacy concern and therefore, we propose a blockchain oriented approach to resolve the privacy issue without...
Conference Paper
Full-text available
The emergence of smart homes appliances has generated a high volume of data on smart meters belonging to different customers which, however, can not share their data in deregulated smart grids due to privacy concern. Although, these data are important for the service provider in order to provide an efficient service. To encourage customers particip...
Conference Paper
This paper addresses the challenges of load forecasting that occur due to the complex nature of load in different predicting horizons and as well as the total consumption within these horizons. It is not often easy to accurately fit the several complex factors that are faced with demand for electricity into the predicting models. More so, due to th...
Conference Paper
Full-text available
Presently, power systems have the capacities to accommodate different framework for incorporating economic dispatch, transmission, storage, and electricity consumption. This can provide an efficient energy management for controlling, coordinating, planning and operations. This paper focuses on coordinating the behaviors of a typical energy manageme...
Article
Full-text available
Presently, the advancements in the electric system, smart meters, and implementation of renewable energy sources (RES) have yielded extensive changes to the current power grid. This technological innovation in the power grid enhances the generation of electricity to meet the demands of industrial, commercial and residential sectors. However, the in...
Article
Full-text available
This paper presents a model for optimal energy management under the time-of-use (ToU) and critical peak price (CPP) market in a microgrid. The microgrid consists of intermittent dispatchable distributed generators, energy storage systems, and multi-home load demands. The optimal energy management problem is a challenging task due to the inherent st...
Conference Paper
Full-text available
In this paper, we presented JAYA algorithm which is a recently developed scheme that do not need any specific parameter to be adjusted except the known control parameters. To achieve the set of objectives like: electricity bill minimization, peak to average ratio (PAR) reduction, minimum user dissatisfaction , a proposed JAYA energy management cont...
Conference Paper
In this paper, we study challenges of electricity consumption management in smart grid, and focus on the different impact of operational time intervals of appliances to ascertain if consumer's comfort can be maximized. The appliance execution process is built on continuous cycle parts, having a demand power rating with objective of obtaining a mini...
Article
Full-text available
This paper provide an automated way of correlAt- ing intruSion Evidence fRom hoNEypot and neTwork (ASERNET). With this evidence, electronic feeds can be provided to organizations for protecting their re- sources.
Thesis
To learn more about attack pattern and attacker behaviour, the concept of electronic baits such as network resources, computer, routers, switches deployed to be probed, attacked and compromised are used in the area of information technology (IT) security under the name honeypot. These electronic baits lure in attackers and help in assessment of vul...
Article
Full-text available
Network forensics have emerged as important procedures for collecting, analyzing, reporting, and documenting of critical situations that requires real-time investigation of network attack and evidence acquisition for decision making processes. Investigating network attack is a contemporary challenging issue. A vital number of several network attack...
Article
Full-text available
Location aware devices are used extensively in many networking systems such as car navigation, IP traceback, the collected spatio-temporal data capture the detected movement information of the tagged objects, offering tremendous opportunities for data mining of useful knowledge.

Questions

Questions (4)
Question
Dear all,
I am working on the cost assessment of solar home system (SHS) for developing countries (precisely Africa). This cost parameter will help me in computing the levelized cost of energy. The dataset should contain current assets and current liabilities. Your suggestions and contributions are highly appreciated.
Thanks
Question
I am currently doing research on blockchain, specifically the ethereum blockchain. I will be grateful to know the other input parameter(s) and how to calculate the gas consumption, throughput and commit delay. Links and existing work will be highly appreciated.
Question
I will like to know how can someone compute the active, reactive and voltage stability index of 30-bus distribution system to get the following prediction horizons: daily, weekly and monthly.
Matlab code will be preferable?
Question
Greetings all.
I am trying to find the suitable solution to solve the MDP which has extreme of a functional and does not have any analytic solution. Although, Bellman equation solved the approximate dynamic programming (ADP) that addressed the above problem. However are there any other methods to serve as the alternative to ADP?

Network

Cited By

Projects

Projects (2)
Project
The main aim of this project is to share CFP and contribute in the field of networks, information security, and machine learning with friends, colleagues, and collaborators.
Project
We identify certain attributes that are common in the two datasets and then use it to link several other attributes. We use the notion of surjective mapping to construct our proposed algorithm which reduces duplication in the aggregated data. Our method leads to a semi-automated network forensic data correlation which is feasible without losing the key information. Our experiment also indicates that forensics correlation is more effective when traces of intrusion are gathered from multiple sensors and analysed. Further, using the data mining technique on the correlated dataset we are able to create Snort rules which help in avoiding specific threats in future.