Sanjay Misra

Sanjay Misra
Østfold University College · Department of Computer Science and Communication

M.Tech.(Software Engineering), Ph.D(Information Engineering)
ACM Distinguished Speaker (https://speakers.acm.org/speakers/misra_13229) Head,Soft Engg Modelling& Intelligence Cluster

About

756
Publications
481,764
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,210
Citations
Citations since 2016
556 Research Items
5440 Citations
201620172018201920202021202205001,0001,500
201620172018201920202021202205001,0001,500
201620172018201920202021202205001,0001,500
201620172018201920202021202205001,0001,500
Introduction
Sanjay Misra is Professor of Comp(Soft) Engg at Covenant University, Ota, Nigeria. He has wide experience in academic administration & researches in various universities in Asia, Europe Africa.He is PhD in Information Engg(Software Eng) from Uni of Alcala,Spain.As of today(31/12/20),as per SciVal(SCOPUS- Elsevier) analysis-He is most productive researcher(no.1)in Nigeria during 12-17,13-18,14-19,15-20 (in all discipline),in computer sci.No 1 in Nigeria & no 2 in Africa.(https://t.co/fBYnVxbmi).
Additional affiliations
October 2012 - September 2022
Covenant University Ota Ogun State, Nigeria
Position
  • Developer
January 2010 - October 2012
Federal University of Technology Minna
Position
  • Professor (Full) and Chairman/Head
February 2006 - January 2010
Atilim University
Position
  • Ass Professor
Education
September 2012 - December 2015
University of Alcalá
Field of study
  • Information(Software) Engineering

Publications

Publications (756)
Chapter
The advent of artificial intelligence in medical field is playing a significant role in improving healthcare services. In healthcare, there is always need for an intelligent method to schedule resources and patients in order to reduce patient waiting time. The treatment process of patients from their arrival to the starting time of consultation is...
Chapter
The development of technology in our modern day has led to the generation of huge data. This is evident by the 2.5 quintillions of data generated by persons connected to the Internet per day in 2020. With the expectation of 5.3 billion Internet users by 2023, complex and efficient tools, models, or approaches that will explore, analyze, and produce...
Article
Full-text available
The Internet of Things (IoT) refers to the collection of all those devices that could connect to the Internet to collect and share data. The introduction of varied devices continues to grow tremendously, posing new privacy and security risks—the proliferation of Internet connections and the advent of new technologies such as the IoT. Various and so...
Chapter
The science and technology of monitoring and analyzing biological data is known as biometrics. Biometrics refers to technologies that measure and analyze human bodily characteristics for authentication purposes, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns, and hand measurements. The discipline of biometric has...
Chapter
Agriculture is undergoing a revolution from the deployments of traditional methods in carrying daily operations with the advent of Information Technologies and web based computing. As the activities involved in the agricultural practices become more bogging in recent times, the need for more instant communication becomes essential amidst key practi...
Chapter
Stroke is a subsequent cause of death in the world and a primary reason for infirmity, with a high rising in developing countries. Most strokes are caused by an ischemic stroke which is a result of arterial occlusion. In most cases, strokes are found in people aged 55 and above. They occur more often in men than women although women tend to fall, v...
Chapter
The study used the existing conceptualizations of peace and war journalism to create supervised machine learning text classifiers trained and tested to identify the war or peace orientations of news stories posted on social media. Peace-oriented journalists promote peace initiatives, ignore differences, and promote conflict resolution. In contrast,...
Chapter
The Internet of Medical Things (IoMT) is a growing paradigm that offers several efficient and productive solutions for the treatment of various ailments for both patients and medical professionals. The IoMT has many advantages, but security remains a problem that must be overcome. The inexperienced IoMT users’ lack of security and privacy conscious...
Chapter
The diabetes mellitus has been known to be a serious illness and revered for its ability to cause high mortality rate. This disease is famous among both youth and adult for its existence in the human body, and very difficult to diagnose, thus, produces an under-diagnosis issue when clinicians try to pinpoint the precise symptoms for disease predict...
Article
Full-text available
The aim of this systematic literature review (SLR) is to identify and critically evaluate current research advancements with respect to small data and the use of data augmentation methods to increase the amount of data available for deep learning classifiers for sound (including voice, speech, and related audio signals) classification. Methodology:...
Chapter
In the originally published version of chapter 34 the affiliations of two Authors were indicated incorrectly. This has been corrected as follows: affiliation of the Author Roseline Oluwaseun Ogundokun has been changed to “Department of Computer Science, Landmark University, Omu Aran, Nigeria”; affiliation of the Author Sanjay Misra has been changed...
Chapter
Maintenance is the most important part of software product development. It is a major component of all software development life cycle models (SDLC). Several variables are being used as intermediaries for software systems’ maintainability throughout software development. The goal of this study is to see whether these variables are consistent betwee...
Chapter
A review of the web camera surveillance, face recognition, convolution neural network (CNN), digital images are presented in this work. Previous works on face recognition systems for enhanced surveillance-based security are presented together with relevant deep learning concepts and theories relating to convolutional neural networks. In-depth analy...
Chapter
In modern cities, waste management has become a problem as waste is being generated faster than it is being managed, and this is leading to serious environmental pollution. Most conventional trash bins in place are not being emptied efficiently enough which leads to the overflow of waste and the breed of pests, insects and the dreadful diseases the...
Article
Full-text available
Introduction Vaccines are the most important instrument for bringing the pandemic to a close and saving lives and helping to reduce the risks of infection. It is important that everyone has equal access to immunizations that are both safe and effective. There is no one who is safe until everyone gets vaccinated. COVID-19 vaccinations are a game-cha...
Article
Full-text available
With the fast development of insurtech, many researchers are doing research in understanding customer behavior regarding the adoption of insurance applications. However, there is a lack of research on the subject in developing countries such as Vietnam. The primary purpose of this article is to develop a predictive model for the intention to use th...
Article
Full-text available
Posture detection targets toward providing assessments for the monitoring of the health and welfare of humans have been of great interest to researchers from different disciplines. The use of computer vision systems for posture recognition might result in useful improvements in healthy aging and support for elderly people in their daily activities...
Article
Full-text available
Container-based virtualization has gained significant popularity in recent years because of its simplicity in deployment and adaptability in terms of cloud resource provisioning. Containerization technology is the recent development in cloud computing systems that is more efficient, reliable, and has better overall performance than a traditional vi...
Article
Full-text available
Human posture classification (HPC) is the process of identifying a human pose from a still image or moving image that was recorded by a digicam. This makes it easier to keep a record of people’s postures, which is helpful for many things. The intricate surroundings that are depicted in the image, such as occlusion and the camera view angle, make HP...
Chapter
The COVID-19 pandemic has changed the way we go about our everyday lives, and we will continue to see its impact for a long time. These changes especially apply to the business world, where the market is very volatile as a result. Requirements of the people are changing rapidly, as are the restrictions on transport and trade of goods. Due to the in...
Chapter
Agriculture is the most crucial sector which raises the economy of every country; several techniques have been developed to control and monitor the environment in which a particular crop is growing. Famers need efficient support in terms of monitoring the temperature, the humidity, the water supply etc. However, the measurements provided by a wirel...
Chapter
Traditional farming is a process in which man works the soil for planting seeds or rearing animals, either to provide food for himself and his family or for business. The traditional farming system faces myriads’ challenges ranging from difficulty in getting good soil, high cost of plowing and weed removal, difficulty in pest control, and plant mon...
Chapter
With the development of cloud computing, load balancing issues have substantially become prominent, which is of concern as well to the industry as to academia. Load balancing contributes to a high degree of customer satisfaction and the use of resources in the cloud by verifying an accurate, secure, and equitable allocation of all computing resourc...
Chapter
The African continent is made up of people with rich diverse cultures and spoken languages. Despite the diversity, one common point of unification, especially among the West African communities is the spoken pidgin-English language. With the development in web technology and the English language dominancy of web content, this growing population sta...
Article
Full-text available
Background: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer technologies. However, in a world where third parties are capable of collecting, stealing, and destroying information without authorization, cryptography remains the primary tool that...
Article
This article examines the relationship between four review policies (RP) run by different BioMed Central (BMC) journals, namely single-blind peer review (SBPR), double-blind peer review (DBPR), open peer review (OPR), and transparent peer review (TPR), and CiteScore and Journal impact factor (JIF). As of December 12, 2021, BMC publishes 306 journal...
Chapter
Data turn out to be an imperative production factor that could be equivalent to material possessions and human capital. The rapid growth of cloud computing and IoT triggers the sharp growth of data. Most existing clouds provide a better-coordinated analytics workflow in a rationalized and automatic mode but then again is deficient of prognostic or...
Article
Full-text available
The decision-making process for attaining Sustainable Development Goals (SDGs) can be enhanced through the use of predictive modelling. The application of predictive tools like deep neural networks (DNN) empowers stakeholders with quality information and promotes open data policy for curbing corruption. The anti-corruption drive is a cardinal compo...
Chapter
The enormous volumes of IoT-based datasets in the cloud system produced by medical industries are too multifaceted and in bulky capacity to be handled and scrutinized by conventional analytics procedures. There is a necessity to establish a powerful system for scrutinizing and extracting vital information from this multifaceted data. This chapter p...
Chapter
Protection of equipment and the feeder when a large amount of electric power energy is generated in the distribution network becomes more complex which requires more attention for the safety of personnel and equipment. The focus of this chapter is on the protection system of a grid designed to be integrated into the smart environment-based Internet...
Chapter
Deep concerns about the rise in the number of technological innovations used for perpetrating viral dissemination of disinformation, via major social media platforms during multiparty elections, have been expressed. As strategy scholars observe, it is inimical to democratic systems whose election results are questioned by reason of faulty electoral...
Chapter
While scholars like Wogu and Misra unanimously affirmed the beneficial roles of adopting AI powered ICT systems in various sectors of government and endeavours, most countries in OECD and the Commonwealth - for reasons described as ‘a political reckless attitude' - have shied away from fully adopting and implementing intelligent debt management sys...
Article
Full-text available
The use of small base stations (SBSs) to improve the throughput of cellular networks gave rise to the advent of heterogeneous cellular networks (HCNs). Still, the interleave division multiple access (IDMA) performance in sleep mode active HCNs has not been studied in the existing literature. This research examines the 24‐h throughput, spectral effi...
Chapter
Primary health institution as the main health care institution that addresses the health challenges of individuals in rural areas and those with limited financial capacity in Nigeria houses quality information. However, this information is not properly managed and is not easily available for patients and health personnel. This is because the tradit...
Chapter
In recent years, machine learning techniques have been utilized in sensitive areas such as health, medical diagnosis, facial recognition, cybersecurity, etc. With this exponential growth comes potential large-scale ethical, safety, and social ramifications. With this enhanced ubiquity and sensitivity, concerns about ethics, trust, transparency, and...
Chapter
Full-text available
Over the years, machine learning techniques have been exhaustively used to diagnose the presence of several diseases from medical images. This has achieved acceptable results which has resulted in the use of computer-aided design (CAD) systems as decision support systems for disease diagnosis. However, the best machine learning technique to use for...
Conference Paper
As the internet has advanced over the years, so has the number of cyber-attacks. A sophisticated Intrusion Detection System (IDS) is essential to protect the cyberspace. The goal of IDS is to monitor and evaluate the operations that occur in a network for any signals of probable abnormalities. Although little research has been done in this area, mo...
Article
Aims This paper aims to conduct a Systematic Literature Review (SLR) of the relative applications of text mining in cybersecurity. Objectives worldwide has been attributed to a change in the different activities associated with cyber security and demands a high automation level. Methods In the cyber security domain, text mining is an alternative...
Chapter
Researchers have extensively employed machine learning (ML) approaches to establish forecasting systems in numerous domains like software faults, spam identification, disease foresting, and fraud recognition. The detection of individuals susceptible to heart disease (HD) could assist medical practitioners in their verdict concerning treatments and...
Chapter
Full-text available
Forecasts have historically acted as the foundation for supply chain preparation and execution. Forecasts are at the heart of supply chain decisions, and they have never been more relevant than they are now, thanks to rising consumer demands, shorter lead times, and the need to handle finite capital. Advances of technologies and data processing pro...
Chapter
Full-text available
The longevity of any company’s sustainability is largely dependent on its’ capability to satisfy customers’ needs. Hence, many industrial analysts and researchers have acknowledged the impact of customers’ reviews, which is the most common approach and tool used to ascertain the level of satisfaction or dissatisfaction of. To determine the sentimen...
Article
Full-text available
Federated learning (FL) is a scheme in which several consumers work collectively to unravel machine learning (ML) problems, with a dominant collector synchronizing the procedure. This decision correspondingly enables the training data to be distributed, guaranteeing that the individual device’s data are secluded. The paper systematically reviewed t...
Article
Full-text available
In today’s healthcare setting, the accurate and timely diagnosis of breast cancer is critical for recovery and treatment in the early stages. In recent years, the Internet of Things (IoT) has experienced a transformation that allows the analysis of real-time and historical data using artificial intelligence (AI) and machine learning (ML) approaches...
Article
Full-text available
Background The effect of stochastic small base station (SBS) deployment on the energy efficiency (EE) and spectral efficiency (SE) of sparse code multiple access (SCMA)‐based heterogeneous cellular networks (HCNs) is still mostly unknown. Aim This research study seeks to provide insight into the interaction between SE and EE in SBS sleep‐mode enab...
Article
Full-text available
Purpose This paper claims to identify the behavioral and cultural features that push to use, or not, cryptocurrencies for electronic commerce. Indeed, despite the use of cryptocurrencies for electronic commerce spreading worldwide at a fast and growing pace, there are supporters and detractors among their users. The analysis of what distinguish the...
Article
Full-text available
Software and symmetric testing methodologies are primarily used in detecting software defects, but these testing methodologies need to be optimized to mitigate the wasting of resources. As mobile applications are becoming more prevalent in recent times, the need to have mobile applications that satisfy software quality through testing cannot be ove...
Book
The Global Conference on Artificial Intelligence and Applications (GCAIA 2021) provides a prominent venue for researchers, engineers, entrepreneurs, and scholar students to share their research ideas in the area of AI. Academic researchers would reveal the results and conclusions of laboratory based investigations via the GCAIA 21 platform, which b...
Article
Full-text available
SMS, one of the most popular and fast‐growing GSM value‐added services worldwide, has attracted unwanted SMS, also known as SMS spam. The effects of SMS spam are significant as it affects both the users and the service providers, causing a massive gap in trust among both parties. This article presents a deep learning model based on BiLSTM. Further,...
Chapter
Full-text available
Governments and informal sectors require accurate perception concerning the impending size of various entities such as population, resources, demands, consumptions, and failures for purpose of planning activities. In order to acquire this information, the behavior of the associated variables is analyzed on the basis of past; thereafter utilize the...
Chapter
Voting is a concept used to describe the part of the election process. It is a means by which the citizens choose who to lead them for a designated period. There is various type of manual and electronic voting processes currently in use. Manual voting processes have become a tool by which government bodies in Nigeria and other African countries at...
Chapter
It is usually a challenging task predicting violent crime occurrences in space and time. Huge dataset are needed for accurate prediction of future violent crime occurrence, which in most cases were subjected to artificial intelligence or statistical methods. Most studies from literature adopted data mining techniques for violent crime prediction wi...
Chapter
The monster called crime has been living with us from the beginning of human existence and impacts negatively on the general health of a nation. Different approaches were employed in the past studies for predicting occurrence of violent crime to aid predictive policing, which makes conventional policing more efficient and proactive. This paper inve...
Data
This datasets describes our characterized cryptographic model for secured e-transactional processes. The derivation of the computational model was done using Bayesian machine learning technique. The data derived an unbiased uniform estimator for service accessibility in e-transaction processes. The harmonized cryptographic model for secured e-trans...
Article
Full-text available
Cyber attacks are increasing rapidly due to advanced digital technologies used by hackers. In addition, cybercriminals are conducting cyber attacks, making cyber security a rapidly growing field. Although machine learning techniques worked well in solving large-scale cybersecurity problems, an emerging concept of deep learning (DL) that caught on d...
Article
Full-text available
Fake COVID-19 tweets are dangerous since they are misinformative, completely inaccurate, as threatening the efforts for flattening the pandemic curve. Thus, aside the COVID-19 pandemic, dealing with fake news and myths about the virus constitute an infodemic issue, which must be tackled by ensuring only valid information. In this context, this stud...
Article
Full-text available
Mining opinion on social media microblogs presents opportunities to extract meaningful insight from the public from trending issues like the “yahoo-yahoo” which in Nigeria, is synonymous to cybercrime. In this study, content analysis of selected historical tweets from “yahoo-yahoo” hash-tag was conducted for sentiment and topic modelling. A corpus...
Article
Full-text available
Current research endeavors in the application of artificial intelligence (AI) methods in the diagnosis of the COVID-19 disease has proven indispensable with very promising results. Despite these promising results, there are still limitations in real-time detection of COVID-19 using reverse transcription polymerase chain reaction (RT-PCR) test data,...
Chapter
Studies on domestic violence against women (DVAW) reveals that the patriarchal and socio-cultural mindset of Nigerians, which tend to dignify the roles of men over women, thus encumbering the full implementation of the laws designed to protect the dignity of womanhood, is at the crux of factors militating against women. With the culture violence th...
Article
Full-text available
Cyberattacks are becoming more sophisticated and ubiquitous. Cybercriminals are inevitably adopting Artificial Intelligence (AI) techniques to evade the cyberspace and cause greater damages without being noticed. Researchers in cybersecurity domain have not researched the concept behind AI-powered cyberattacks enough to understand the level of soph...
Chapter
Full-text available
Health technologies have led to an explosion of large data leading to the exponential increase in data in length, velocity, and diversity. Current data collection and management systems are unable to meet the demands of heterogeneous data. As a result, using computational intelligence (CI) methods in medical data will help with improved control, fa...
Chapter
Cloud computing technology is on the rise in our world today. It has become a sought-after technology due to its flexibility for users to access their data at any time of the day. From anywhere they are provided, there is an Internet connection. One of the challenges this technology faces is security, due to this reason, some organization has refus...
Chapter
Full-text available
Steganography has recently turned out to be an excellent field of science that is used to shield data from illegal entry. Steganography is described as the skill of communication which involves concealing knowledge in a different medium, for instance, textual, image, audio, video, or network in order not to provoke any trace, whereas steganalysis i...
Chapter
Cloud computing is a technology that provides users with computing resources and storage. It removes the need for businesses and institutes to maintain expensive computing facilities and improves organizations by its services. This paper aims to use cryptography techniques to enhance data security in the cloud by implementing the provided algorithm...
Article
Full-text available
The planet earth has been facing COVID-19 epidemic as a challenge in recent time. It is predictable that the world will be fighting the pandemic by taking precautions steps before an operative vaccine is found. The IoT produces huge data volumes, whether private or public, through the invention of IoT devices in the form of smart devices with an im...
Chapter
TheClassification introduction of blockchain technologyBlockchain Technology (BT) has evolved into a distinctive, disturbing, and trendy technology in recent years. Data security and privacy are prioritized in BT's decentralized database. New security concerns raised by BT include common attacks and double-spending. To address the above-mentioned c...
Article
The recent innovations in network application and the internet have made data and network security the major role in data communication system development. Cryptography is one of the outstanding and powerful tools for ensuring data and network security. In cryptography, randomization of encrypted data increases the security level as well as the Com...
Article
Fake COVID-19 tweets are dangerous since they are misinformative, completely inaccurate, as threatening the efforts for flattening the pandemic curve. Thus, aside the COVID-19 pandemic, dealing with fake news and myths about the virus constitute an infodemic issue, which must be tackled by ensuring only valid information. In this context, this stud...
Chapter
Drivers safety is of great importance in the automotive industry today, the paramount reason for the automatic wiper controller is it helps drivers by eliminating distractions and providing overall comfort to the driver. In many recent cases, manual errors could occur from not increasing the speed of the wiper by the driver, which will as such resu...