Skip to main content
Publication Title NEURAL NETWORK MODELS: A Basic Statistical Tool for Data analysis and Forecasting Download PDF
Publication Type journal
Publisher
Publication Authors Maitanmi Olusola a*, Malasowe Bridgetb , Emuobonuvie Erhinyoja Andyc, Adekunle Yinkad, Gregory Onwodie
Year Published 1-10
Abstract Neural network model is a model of brain’s cognitive process. Neural network originated as a model of how the brain works and has its beginnings in psychology. Today, neural network models are used to solve numerous problems associated with forecasting, pattern recognition, classification, manufacturing, medical diagnostic, signal processing, system control, checking, and modelling among others. This paper reveals the processes involved in using a neural network model in forecasting future events by effectively and efficiently utilizing extracted rules from trained neural networks and domain knowledge of the applied area. The structural method of operations and rules of extraction of neural networks were also discussed.
Publication Title Improved services traceability and management of a food value chain using block-chain network: a case of Nigeria Download PDF
Publication Type journal
Publisher Indonesian Journal of Electrical Engineering and Computer Science
Publication Authors Maureen Ifeanyi Akazue, Rume Elizabeth Yoro, Bridget Ogheneovo Malasowe, Obinna Nwankwo, Arnold Arnold Ojugo
Year Published 3-01
Abstract Competitive asset markets and increased globalization have continued to ripple the food value chain with complex dynamics, which has led to a range of challenges such as food safety and quality, traceability, and overall supply chain inefficiency. These have further continued to endanger the general well-being of society. With rice as a staple food in Nigeria, the rice food supply value chain consists of a series of tasks, processes, and activities that are linked together from freshly harvested products to consumer demand and supply. Study advances the SmartRice, a sensor-based block-chain framework that decentralizes as well as provides a decision-support for the food supply value chain process by first ensuring that accurate data of harvested goods are reported, and passed on to a chain. The study advances a decentralized framework to eliminate various forms of fraud rippled across the existing centralized system, minimize corruption through its sensor-based layered model as well as minimize the error in reported data along the value chain.
Publication Title Assessing contributor features to phishing susceptibility amongst students of petroleum resources varsity in Nigeria Download PDF
Publication Type journal
Publisher International Journal of Electrical and Computer Engineering (IJECE)
Publication Authors RE Yoro, FO Aghware, BO Malasowe, O Nwankwo, AA Ojugo
Year Published 4-01
Abstract In this observational quasi-experimental study, we recruited 200 participants during the Federal University of Petroleum Resources Effurun’s (FUPRE) orientation, who were exposed to socially engineered (phishing) attacks over nine months. Attacks sought to extract participants’ data and/or entice them to click (compromised) links. The study aims to determine phishing exposure and risks among undergraduates in FUPRE (Nigeria) by observing their responses to socially-engineered attacks and exploring their attitudes to cybercrime risks before and after phishing attacks. The study primed all students in place of cybercrime awareness to remain vigilant to scams and explored the various scam types with their influence on gender, age, status, and their perceived safety on susceptibility to scams. Results show that contrary to public beliefs, these factors have all been found to be associated with scam susceptibility and vulnerability of the participants.
Publication Title WEB- BASED FAMILY BUDGETING Download PDF
Publication Type journal
Publisher International Journal of Advances in Computer Science and Technology
Publication Authors Maitanmi S. O, Ayinde, S.A, Adekola, O.D, Omotunde, A.O, Malasowe, B.O
Year Published 5-10
Abstract A plan specifying how family resources especially money and time will be allocated or spent during a particular period is called family budgeting. This research work covers an impressive collaborative budgeting tool that lets you plan out your spending habits either long term or short term, not dwelling on the deluge of cash wasted in the past. This application was built as a result of some everyday problems like: daily accumulation of debts, lack of savings, financial stress, among others. The software was built on short time budgeting as regards the long time which is prevalent. In addition, the software is highly processor demanding especially when in use, the application cannot monitor users with offline account and has to trust the user to input the accurate values. The research work concluded by introducing a new system that is user friendly, and efficient. On the successful implementation of the new system, it is our belief that masses will acquire this to better their standard of living.
Publication Title A Survey Of Dna Computing Download PDF
Publication Type journal
Publisher Quest Journals Journal of Research in Humanities and Social Science
Publication Authors Malasowe Bridget, Awodele Oludele, Maitanmi Olusola, Emuobonuvie Andy
Year Published 0-04
Abstract In recent times, computer chip manufacturers are frantically racing to make the next microprocessor that will overthrow speed records. So Microprocessors made of silicon will eventually reach their limits of speed and miniaturization and their manufacturers will need a new material to produce faster computing speeds. But fortunately scientists have found the new material they need to build the next generation of microprocessors. Millions of natural supercomputers exist inside living organisms, including our body. DNA (deoxyribonucleic acid) molecules, the material our genes are made of, have the potential to perform calculations many times faster than the most powerful human-built computers. DNA might in the nearest future be integrated into a computer chip to create a so-called BIOCHIP that makes computers even faster. DNA molecules have already been harnessed to perform complex mathematical problems by researchers.While still in its early life,DNAcomputers will be capable of storing billions of times more data than today personal computer. In this article, a survey of recent research on DNA computing is discussed and the possibility that it might take the place of silicon-based computers in the next decade.
Publication Title Unpacking Ethics: A Survey of Existing Literatures on Bioinformatic Research Download PDF
Publication Type journal
Publisher International Journal of advanced studies in Computer Science and Engineering
Publication Authors Malasowe Bridget O., Omotosho O. J. (Prof)
Year Published 1-12
Abstract The main ethical, legal, and social issues in bioinformatics research concerns who controls the acquisition of a person’s Genome and the information it contains; what are the uses of the information; and who decides how the information is used. The ethical and legal challenge is to fairly resolve the ownership, consent, and privacy questions so that individuas, consumers and the public will have confidence that results of bioinformatics sequencing carried out by bioinformaticians will benefit rather than harm them. A key foundational issue is determining who has dispositional rights over an individual’s health report. This research work surveys the current state of the art in ethical issues as it affects research in bioinformatics. The purpose of this Research work is to survey available ethical issues in Bioinformatic research. The intention is not to provide an exhaustive list. Rather, the intention is to identify well-established ethical issues that are used as ethical standard in Bioinformatic research.
Publication Title Current State of the Art in Mobile Transaction Models: A survey Download PDF
Publication Type journal
Publisher International Journal of Advanced Studies in Computer Science and Engineering
Publication Authors Malasowe Bridget, S. A Idowu
Year Published 1-03
Abstract Mobile Database popularity is on the increasing by the secend as people need information while they are on the move in today fast changing world. This new technology allows users of mobile devices to connect to their corporate networks, collect the needed data, carry out theirr jobs while in disconnected mode and reconnect back to the network to synchronize with the corporate database. But the critical issue in mobile data management is to respond to real – time data access requirements of the supported application. However, it is difficult to handle real-time constraints in today mobile computing environment due to the physical constrains imposed by the mobile computer hardware and wireless network technology in use. The availability of the World Wide Web on mobile computing systems is expected to open up a new class of applications which provide location sensitive applications. The data is being moved closer to the applications in order to improve the performance and autonomy. These activities has lead to many problems in mobile Transactions. This paper surveys the current state of the art in Mobile Transactions Models. The survey focuses on recent types of Transaction Models proposed by some scholars.
Publication Title DESIGN AND IMPLEMENTATION OF A MOBILE BASED FUZZY EXPERT SYSTEM FOR PRE BREAST CANCER GROWTH PROGNOSIS Download PDF
Publication Type journal
Publisher International Journal of Advanced Research in Computer Science
Publication Authors Malasowe Bridget O. (PhD, Awodele Oludele (Prof.), Okolie S. O. (Prof,), Omotosho O. J. (Prof.)
Year Published 5-01
Abstract Fuzzy logic has different approaches for enhancing personal health care delivery. Currently, breast cancer is rated as the second leading cause of death among women. Previous studies using fuzzy logic were directed at reoccurrence/survivability. However, there is need for early identification of the predisposing factors of the disease and its elimination. This study focuses on developing a Mobile-based Fuzzy Expert System (MFES) to predict an individual risk of initial cancer growth. The predisposing risk factors of breast cancer were elicited from four domain experts through direct contact; this was used to generate the fuzzy rules. The fuzzy inference approach was employed to formulate the membership functions.Mamdani approach was used for the system design. The system accommodates imprecision, tolerance and uncertainty to achieve tractability, robustness and low cost. Java expert system shell running on Android operating system was used to achieve the mobile technology aspect. For the purpose of system evaluation, 2500 data were collected from two health care centers in Nigeria using random sampling. The result indicated that the fact elicited from the experts served as range values for the 12 risk factors for fuzzification of the input and thus, 36 rules were generated. The rules were used for the system development. The developed MFES recorded 96% accuracy. It is therefore recommended that MFES be used to detect breast cancer risk levels early enough. The main contribution of this work is to reduce the incidence rate in contrast to the existing methods currently applied in the diagnosis of breast cancer.
Publication Title DESIGN AND IMPLEMENTATION OF A REAL-TIME VEHICLE TRACKING SYSTEM
Publication Type journal
Publisher INTERNATIONAL JOURNAL OF RESEARCH IN COMMERCE, IT & MANAGEMENT
Publication Authors MAITANMI OLUSOLA STEPHEN, OGUNLERE SAMSON OJO, DR. ADEKUNLE YINKA, GREGORY ONWODI & MALASOWE BRIDGET
Year Published 9-10
Abstract Security in general is a major concern in our society today and over time, the security of vehicles has become a priority. Various inventions and technologies have been brought about to put minds at rest, but the complete eradication of theft of cars is much of a tedious task. A solution to knowing the location of vehicles either when they are stolen or for any other reasons. To know this location, it involves the installation of a vehicle tracker in a hidden position in the vehicle so that it is not easily seen while providing essential clues as to the location of the vehicle and also a remote tracking server that receives the location information of the car in longitude and latitude and converts it to a physical address and sends it to the authorized user.
Publication Title Economics of Cloud Computing Download PDF
Publication Type journal
Publisher International Journal of Engineering and Innovative Technology (IJEIT)
Publication Authors Adekunle, Y.A, Maitanmi, S.O, Malasowe, B.O, Osundina, S. A
Year Published 4-10
Abstract In an attempt to gain a competitive edge, businesses are increasingly looking for new and innovative ways to cut costs while maximizing profits especially now that the world is experiencing economic downturn. Firms recognize that they need to grow and as a result are under pressure to save money. This has forced the realization that new ideas and methods may produce better results than the tried and tested formulas of old. It is the growing acceptance of innovative technologies that has seen cloud computing become a realizable innovation in information technology (IT). Many have heard of cloud computing, but far fewer actually understand what it is and, more importantly, how it can benefit them. In this research paper, we focused on the economics of cloud rather than technologies; we outline the underlying business benefits it can bring to various users and the economics of scale focusing on what makes it truly different from client/server.
Publication Title Empirical evidence of phishing menace among undergraduate smartphone users in selected universities in Nigeria Download PDF
Publication Type journal
Publisher Indonesian Journal of Electrical Engineering and Computer Science
Publication Authors Maureen Ifeanyi Akazue, Arnold Adimabua Ojugo, Rume Elizabeth Yoro, Bridget Ogheneovo Malasowe, Obinna Nwankwo
Year Published 2-01
Abstract In our exploratory quasi-experimental study, 480-student were recruited and exposed to social engineering directives during a university orientation week. The directives phishing attacks were performed for 10 months in 2021. The contents attempted to elicit personal user-data from participants, enticing them to click compromised links. The study aimed to determine cybercrime risks among undergraduates in selected universities in Nigeria, observe responses to socially-engineered attacks, and explore their attitudes to cybercrime risks before/after such attacks. The study generalized that all participants have great deal awareness of cybercrime, and also primed all throughout study to remain vigilant to scams. The study explores various types of scam and its influence on students’ gender and age on perceived safety on susceptibility to phishing scams. Results show that contrary to public beliefs, none of these factors were associated with scam susceptibility and vulnerability rates of the participants.
Publication Title Imperatives for the Establishment of a National Database to Address Security Issues in Nigeria. Download PDF
Publication Type conference
Publisher isteams NEXUS conference
Paper Link www.isteams.org
Publication Authors Maitanmi, S. O, Malasowe B.O., Emuobonuvie E. A.
Year Published 1-04
Abstract The status of Nigerian security challenges should be one of the popular tales by moon light to all growing children in every home. This would enable them to run and fly as against crawling and walking when exposed to dangers. This paper focuses on the survey of the benefits surrounding the creation of central national database in Nigeria. Presently, Nigeria is critically facing security challenges because people are not uniquely identified and tagged. The situation has led to insecurity in Nigeria with different trends and dimensions from one geopolitical zone to the other. For example, this has led to various faceless activities such as Islamic sect popularly known as Boko Haram in Nigeria, rampant armed robbery everywhere, notorious robbery and kidnapping in the South-East and South-South, corruption and unemployment are all over, uncontrollable/unidentifiable immigrants, unaccountable birth/death rates in hospital/healthcare centers, and reckless drivers that had claimed more lives than help. To control such devastating effects in Nigeria, central national database must be created to solving identity challenges, tackle loose neighboring borders, labels sectional terrorist, detain corruption leaders, criminals will be identified through database resources. The paper therefore highlight the process by which a central database can control the above listed challenges in Nigeria.
Publication Title GREENING THE CAMPUS-DESIGN OF A GENERIC GREEN IT MODEL FOR POSSIBLE ADOPTION. (A CASE STUDY OF AN EDUCATIONAL INSTITUTION IN NIGERIA) Download PDF
Publication Type journal
Publisher Asian Journal of Computer Science and Information Technology
Publication Authors Awodele Oludele, Malasowe Bridget O., Onuiri Ernest E.
Year Published 1-04
Abstract Society’s reliance on Information Technology (IT) has increased tremendously in the last few decades. Unfortunately, the growth of the IT sector has seemingly occurred at the expense of the environment. The adverse environmental impact of IT operations is partly due to the production and disposal of IT equipment, which gives rise to the release of harmful pollution agents and toxic materials into the environment. The push for carbon footprint reduction by the international community and the realization by major IT organizations on the adverse effect of their operations on the environment are forces behind the evolution of the green IT framework. This reasearch work focuses on measuring the Carbon Footprint of an educational institution in Nigeria and the design of a Generic Green IT Model for possible adoption. The scopes laid out by the GHG (Greenhouse Gas) Protocol was adopted for this research. The CO2 emission from Scope 1 ( Fuel and diesel consumption on campus), scope 2 (purchased electricity) and scope 3 (staff and student commuting) were calculated respectively. Emission factor–based calculation approach was used to calculate the CO2 emission of the institution (WRI – World Resources Institute). The result of this calculation was used to design a Generic Green IT Model.
Publication Title Improved services traceability and management of a food value chain using block-chain network: a case of Nigeria Download PDF
Publication Type journal
Publisher Indonesian Journal of Electrical Engineering and Computer Science
Publication Authors Maureen Ifeanyi Akazue, Rume Elizabeth Yoro, Bridget Ogheneovo Malasowe, Obinna Nwankwo, Arnold Adimabua Ojugo
Year Published 3-01
Abstract Competitive asset markets and increased globalization have continued to ripple the food value chain with complex dynamics, which has led to a range of challenges such as food safety and quality, traceability, and overall supply chain inefficiency. These have further continued to endanger the general well-being of society. With rice as a staple food in Nigeria, the rice food supply value chain consists of a series of tasks, processes, and activities that are linked together from freshly harvested products to consumer demand and supply. Study advances the SmartRice, a sensor-based block-chain framework that decentralizes as well as provides a decision-support for the food supply value chain process by first ensuring that accurate data of harvested goods are reported, and passed on to a chain. The study advances a decentralized framework to eliminate various forms of fraud rippled across the existing centralized system, minimize corruption through its sensor-based layered model as well as minimize the error in reported data along the value chain.
Publication Title Information Technology as a vehicle to Millennium Development Goals Download PDF
Publication Type journal
Publisher IJASCSE
Paper Link www.ijascse.org
Publication Authors Maitanmi Olusola, Adekunle Yinka, Malasowe Bridget, Gregory Onwodi
Year Published 1-03
Abstract Eradicating extreme poverty continues to be one of the major challenges of developing countries like Nigeria, and is a major concern of the international community. Ending this menace will require the combined efforts of everybody. This is why information technology will remain a vehicle to Millennium Development Goals in this dispensation. This paper sets out as an evaluation of existing developments, and researches done comparing it to the expected goals set by European Union. To achieve this, the writers discourse the different roles information communication technology (ICTs) can play in reducing poverty, providing education and quality healthcare services for all, promoting gender equality and coping with environmental change and extreme climate events. The writers proffer solutions to all area of weaknesses which would help to facilitate the achievement of the stated goals come 2015.
Publication Title LITTLE THINGS THAT MATTERS – GREEN INFORMATION TECHNOLOGY TODAY - A REVIEW Download PDF
Publication Type journal
Publisher International Journal of Advanced Research in Computer Science
Paper Link www.ijarcs.info
Publication Authors Malasowe Bridget O. (PhD) and Emuobonuvie Andy
Year Published 0-01
Abstract Carbon Productivity, Green Information Technology (GIT), Environmental Sustainability, Green Information System (GIS), Data Centre, CO2 Emission
Publication Title Model-Based Information Retrieval System Download PDF
Publication Type journal
Publisher International Journal of Computer (IJC)
Publication Authors Maitanmi Olusola Stephen, Adekunle Yinka, Adio Adesina Kamorudeen, Onwodi Gregory, Malasowe Bridget
Year Published 1-19
Abstract Information retrieval System (IRS) is often defined as the location and delivery of documents to a user to satisfy their information needs. IR is the area of study concerned with searching for documents, for information within documents, and for metadata about documents, as well as that of searching structured storage, relational databases, and the worldwide web. There is an overlap in the usage of the terms data retrieval, document retrieval, information retrieval, and text retrieval. IR is interdisciplinary; based on computer science, mathematics, library science, information science, informationarchitecture, cognitive psychology, linguistics, statistics and law. Automated information retrieval systems are used to reduce what has been called information overload. Many universities and public libraries use IR system to provide access to books, journals and other documents. Web search engines are the most visible IR applications. This article is the design and implementation of information retrieval system that deals with this aspect of the institution’s administration by providing an easy to use computerized application to assist in retrieving information.
Publication Title THE BORDERLESS WORLD-INFORMATION AND COMMUNICATION TECHNOLOGY (GREEN); BRIDGING DIGITAL GAP IN EDUCATION.
Publication Type conference
Publisher Association for Digital Education and Communications Technology Conference Proceedings
Publication Authors AGHWARE F. O (PHD), MALASOWE B. O (PHD) AND OJIE D. V
Year Published 1-04
Abstract A colossal causatum of the COVID-19 sudden happening is the radical global embrace of Information and Communication Technology (ICT) in all spheres of the education sector especially in developed economies regardless the preparedness. Going by the new normal kind of, irrespective of the imminent challenges of its prior ubiquitous adoption, there is now a swift resultant ICT inclusion in which the economy is wholly driven by ICT. Notably in education, the COVID -19 disruption scaled up ICT as an instantaneous apparatus to subsist the teaching and learning sector during the universal lockdown which ravaged the whole world between 2019 through 2020 of which the impact still evident. Again, the out break of the Pandemic revealed to many world leaders in many developing countries that they had no choice than to embrace an ICT instrument propelling the development of national knowledge-base. Regardless the superficial hitches in ICT integration in teaching and learning, the effects of the COVID-19 pandemic fast tracked ICT penetration hence today, teachers and students in Nigeria and in deed worldwide had no choice than to work online notwithstanding their preparedness in terms of knowledge, skills and resources for the implemetation ICT in teaching and learning. In as much as ICT has come to stay in bridging the gaps in the education sector to in today bortherless world, the place of Green Information Technology must be acknowledged. This research paper addresed how ICT instantaneously bridged the educational gaps in a pandemic inclusive lockdown; and addressing Green IT as it affects our ecosystem. The research has provided the necessary information and details why there should be compulsory implementation of ICT in education to truely bridge the digital gap that existed in the education sector in our today botherless world thus proffering how best to deploy the ICT tools in securing the ecosystem.
Publication Title Adaptive Learner-CBT with Secured Fault-Tolerant and Resumption Capability for Nigerian Universities Download PDF
Publication Type journal
Publisher (IJACSA) International Journal of Advanced Computer Science and Applications
Publication Authors Bridget Ogheneovo Malasowe; Maureen Ifeanyi Akazue; Ejaita Abugor Okpako; Fidelis Obukohwo Aghware; Arnold Adimabua Ojugo; Deborah Voke Ojie
Year Published 2023-09-09
Abstract The post covid-19 studies have reported significant negative impact witnessed on global education and learning with the closure of schools’ physical infrastructure from 2020 to 2022. Its effects today continues to ripple across the learning processes even with advances in e-learning or media literacy. The adoption and integration therein of e-learning on the Nigerian frontier is yet to be fully harnessed. From traditional to blended learning, and to virtual learning – Nigeria must rise, and develop new strategies to address issues with her educational theories as well as to bridge the gap and negative impact of the post covid-19 pandemic. This study implements a virtual learning framework that adequately fuses the alternative delivery asynchronous-learning with traditional synchronous learning for adoption in the Nigerian Educational System. Result showcases improved cognition in learners, engaged qualitative learning, and a learning scenario that ensures a power shift in the educational structure that will further equip learners to become knowledge producer, help teachers to emancipate students academically, in a framework that measures quality of engaged student’s learning.
Publication Title State of the Art on Face Recognition – A Review Download PDF
Publication Type journal
Publisher
Publication Authors Emuobonuvie E. Andya*, Malasowe O. Bridget, Okeh O. Dono, Adeyemi B. Benjaminb
Year Published 2020-02-12
Abstract The high demand for face recognition applications has attracted the interest of researchers in this area. As a result of this, several methodologies have been proposed by scholars in this field. Face recognition methodology aims to detect faces in still image and sequence images. Local, global, and hybrid are approaches used in this area. The major issue of face recognition includes intensity, illumination, difficult to control as well as pose. Face images are highly dynamic and they pose difficult issues and challenges to solve when in use, researchers in pattern recognition, computer vision, and artificial intelligence have proposed many models in other to reduce such difficulties to improve the efficiency, robustness, and accuracy. The objective of this paper is to provide a survey of the current state of research on face recognition methodologies that has been proposed by different researchers. The underlining principles and application areas of face recognition are also presented. Finally, a conclusion on the current state of the art in face recognition was given.
Publication Title Fuzzyfication of the Decision Making Process - Theoretical and Conceptual Antecedents Download PDF
Publication Type journal
Publisher Advances in Multidisciplinary and Scientific Research
Publication Authors Malasowe, Bridget Ogheneovo & Emuobonuvie, Andy
Year Published 2022-09-10
Abstract Fuzzy logic has seen tremendous advancements in the last few decades and is now widely used in a variety of real-world contexts, including control systems, pattern recognition, data mining, and classification, among other fields. Entrepreneurs face significant hurdles in juggling ambiguity and risk while making decisions, making it difficult for them to make the optimal choice. Forecasting business choices and operations is becoming increasingly challenging due to the growing complexity and complexities of corporate environments. Fuzzification is the process of using the data in the knowledge base to transform a crisp input value into a fuzzy value. This study looked at the decision-making process' fuzzification from theoretical and conceptual angles. When information is scarce and of low quality, fuzzy logic provide a natural method for solving multidimensional and difficult problems.
Publication Title Assuring Data Integrity, Preservation, Transparency and Privacy of Genomic Data in the Sharing Process Using Blockchain Technology
Publication Type journal
Publisher https://www.isteams.net/behavioralinformaticsjournal
Publication Authors Malasowe, Bridget Ogheneovo, Okpor, Magaret Dumebi, Aghware Fidelis, Ako, Rita Erhovwo & Edim, Edim Bassey
Year Published 2024-10-23
Abstract Personalized medicine has been made possible by the development of genomic research, which has opened up previously unheard-of possibilities for the identification, management, and prevention of diseases based on unique genetic profiles. On the other hand, privacy, data integrity, and consent management pose serious obstacles to the transparent and safe exchange of genetic data. This study investigates how blockchain technology can help with these issues by providing a decentralized, transparent, and unchangeable platform for exchanging genetic data. With its strong security features, blockchain technology offers a viable answer to the privacy and integrity issues that come with sharing genomic data. Blockchain enables that genetic data can be shared safely and privately among researchers, healthcare professionals, and patients by utilizing decentralized consensus methods and cryptography techniques. Every transaction on the blockchain is connected to earlier transactions and encrypted, forming a tamper-proof record that ensures data integrity. Using a combination of frameworks, case studies, and literature reviews, this research project examined the body of material already available on the applicability of blockchain technology in this field. According to the results of the peer-reviewed literature, blockchain technology not only protects genetic data from manipulation and unwanted access, but it also helps to create a more cooperative and trustworthy environment for genomic research. This opens the door to more rapid progress in personalized treatment and emphasizes how crucial it is to include cutting-edge technical solutions to protect vital
Publication Title State of the Art on Face Recognition – A Review Download PDF
Publication Type journal
Publisher Journal of Multidisciplinary Engineering Science and Technology (JMEST)
Publication Authors Emuobonuvie E. Andya*, Malasowe O. Bridget , Okeh O. Dono , Adeyemi B. Benjamin
Year Published 2020-09-19
Abstract The high demand for face recognition applications has attracted the interest of researchers in this area. As a result of this, several methodologies have been proposed by scholars in this field. Face recognition methodology aims to detect faces in still image and sequence images. Local, global, and hybrid are approaches used in this area. The major issue of face recognition includes intensity, illumination, difficult to control as well as pose. Face images are highly dynamic and they pose difficult issues and challenges to solve when in use, researchers in pattern recognition, computer vision, and artificial intelligence have proposed many models in other to reduce such difficulties to improve the efficiency, robustness, and accuracy. The objective of this paper is to provide a survey of the current state of research on face recognition methodologies that has been proposed by different researchers. The underlining principles and application areas of face recognition are also presented. Finally, a conclusion on the current state of the art in face recognition was given.
Publication Title Empirical Evaluation of Hybrid Cultural Genetic Algorithm Trained Modular Neural Network Ensemble for Credit-Card Fraud Detection Download PDF
Publication Type journal
Publisher International Journal of Advances in Engineering and Management (IJAEM
Publication Authors Fidelis Obukohwo Aghwarea,*, Bridget Ogheneovo Malasowe
Year Published 2023-03-30
Abstract The increasing need for e-commerce, online marketing, and the ineffective vigilance of sellers/buyers often constitutes the fact that criminals are steps ahead of biz owners and users of these products – at all times. Pre-empting fraud before its occurrence is quite possible in traditional non-automated tasks cum transactions owing to the natural intelligence of a seller/buyer. Advances in computing with improved methods and intelligence – are yet to proffer procedures to whollyrestraint fraud. The routine of smart systems,though, is on the upsurge for fraud recognition – nevertheless, it is still demonstratingfutile. Thus, the need to design a predictive intelligent system to monitor, detect and prevent fraudulent activities – especially in regards to credit/smart card transactions. The study suggests a spectral-clustering amalgam of aninherentalgorithm-trainedintegrated neural system to perceive fraud in credit card businesses. The hybrid collaborative seeks to equip credit-card operators with a scheme and procedure whose information will selflesslyspot frauds on credit cards. Consequently, the model excellentlydistinguishesbetween benign and genuine credit card dealings with a prototypical accuracy of 74%
Publication Title Modelling Entrepreneurial Decision Making Process Using Fuzzy Inference Systems Download PDF
Publication Type conference
Publisher Academic City University College – Accra Ghana Society for Multidisciplinary & Advanced Research Techniques (SMART) Africa
Publication Authors Malasowe Bridget Ogheneovo and Emuobonuvie Andy
Year Published 2021-12-14
Abstract The essence of Entrepreneurship is making decisions that are constantly required to evaluate alternatives and make decisions regarding a wide range of matters. Decision making involves a lot of uncertainty and risk which poses serious challenges for Entrepreneurs to joggle among them in other to take the best decision. Study have shown that focus has been mainly on the analysis of the characteristics of potential entrepreneurs and the firm-creation process leaving the critical incredient that will help in decision making. The increasing challenges and complexity of business environments are making business decisions and operations more difficult for entrepreneurs to predict the outcomes of these processes. Hence, this paper proposes a decision support model -Fuzzy Inference System- that could be adapted for various business decision processes. This system has the capability to handle decision making, by critically considering the degree of membership of all the risk involved in a given problem space. The model uses the concept of fuzzy set theory to judiciously select the variables in a given problem space in an uncertain situations. From a real life practical point of view, this theory offers a natural approach to the resolution of multidimensional and complex problems when the available information is sparse and/or of poor quality. The fuzzy rule base system soften the adverse effects that a business may suffer from these uncertain factors.
Publication Title Pilot Study on Webometric for Assessing User Footprint, Satisfaction and Experience on Academic Website: A Case of the University of Delta Agbor Download PDF
Publication Type journal
Publisher FUPRE JOURNAL 8(3):248-262(2024)
Publication Authors MALASOWE, B. 1,* , AGHWARE, F. , EDIM, E. B
Year Published 2024-09-20
Abstract Webometric assesses the user convenience and experience while interacting with web-based system. Businesses use websites to present their deliverables to a larger audience. The aim of which is to refocus and reshape a user’s image of about a business. This has today, been extended to facilitate activities like recruitment etc. We investigate usability of the University of Delta Agbor (UniDEL) website with other select Nigerian varsities using expert review guideline, and to compare the achieved criterion scores against the selected varsities websites. The adopted methodology is the expert review guideline that is available by the World Ranking of Universities. Result shows the overall performance with UniDEL website performing poorly against the selected websites. These are based on the unique strengths and unique gaps. Unique features showed that selected websites successfully ensured that her trust/credibility section and homepages received highest scores. The UniDEL's website was found to struggle for good search usability, and data entry criteria among other flaws in her web design. Findings suggest UniDEL website needs to be reworked with home-pages, search, trust and content features in mind to ensure greater visibility and user experience.
Publication Title Deploying a Campus Telephony to Enhance Tele-Penetration and Service Provision to aid Mobile Computing for Nigerian Undergraduates
Publication Type journal
Publisher Faculty of Science, Sokoto State University
Publication Authors Malasowe, Bridget Ogheneovo; Ojie, Deborah Voke; Okpor, Margaret Dumebi; Ako, Rita Erhovwo, Edim, Edim Bassey, David, Elias Emmanuel(2024)
Year Published 2024-09-03
Abstract The inherent difficulties of IP networks represent a significant turning point in the convergence of information and communication technologies. Voice over Internet Protocol (VoIP) emerged with the introduction of 3G and IPtelephony, providing an efficient exchanging data resources amongst linked users. Supporting hardware, software, and open-source protocols for data, voice, and video sessions enable the integration of data solutions onto a converged network using IP-telephony's array of multi-service technologies. The methodology adopted for the study was to concentrate on the technical concerns related to the implementation of an IP network to improve rural phone service. These included geopolitical, economic and technical issues on implementation. The study result showed that the network has excellent scalability and speed. Nodes also received request with 80% response rate. This demonstrated equivocall that it was possible to reach each notes. For the Federal University of Petroleum Resources Effurun, the researchers suggested a VoIP- based telephony system that will aid campus telepenetration, offer users a number of advantages, and fix latency, packet loss, and jitter problems. Rich media streaming supports blended learning, unified messaging, and other features. It also offers economy, flexibility, mobility, and productivity for users, all of which are advantages. The outcome demonstrates that the framework fixes the packet loss, jitters, and latency problems. The researchers recommend the following measures to mitigate packet loss and jitters: ICT suite and Ethernet cabled network should be employed; installation of wireless LANs and cloud storage for data. These will enable staff and students to access information online.
Publication Title Techniques and Best Practices for Handling Cybersecurity Risks in Educational Technology Environment (EdTech)
Publication Type journal
Publisher NIPES - Journal of Science and Technology Research https://journals.nipes.org/index.php/njstr/issue/view/57
Publication Authors Malasowe Bridget, Fidelis Aghware, Edim Edim Bassey, Rita Ako, Arnold Ojugo
Year Published 2024-06-30
Abstract In order to effectively manage the risk and hazards associated with the online environment, there is a growing demand for cyber security awareness due to the rising use of the Internet and the concerning rise in cyberattacks. The types of cybersecurity risks, best practices and current approaches for controlling cybersecurity threats in educational technology settings are examined in this paper and, we also examined effective cybersecurity case studies. The results show that a variety of cybersecurity threats are faced by educational institutions. These threats include phishing, ransomware attacks, insider threats, malware, social engineering, Distributed Denial of Service (DDoS), vulnerabilities, credential theft, IoT , man-in-the-middle, third-party vendor risks among others. Institutions must implement proactive, effective cybersecurity strategies in order to reduce these risks. These strategies include risk assessments, the creation of strong cybersecurity governance frameworks, multi-factor authentication (MFA), frequent software updates and patch management, robust access controls, data encryption, frequent backups, incident response plans, network segmentation, monitoring, and logging, cyber insurance, and the deployment of access controls and encryption mechanisms. The integration of several cybersecurity strategies, including as vulnerability management, incident response planning, security awareness training, and continuing training programs, is highlighted in the successful case studies. Educational institutions may secure sensitive data, defend against cyberattacks, and guarantee the public's access to secure, continuous education by putting comprehensive cybersecurity strategies and best practices into place. The outcomes of this investigation offer significant perspectives and suggestions for academic establishments and interested parties about the handling of cybersecurity hazards in EdTech settings
Publication Title Quest for Empirical Solution to Runoff Prediction in Nigeria via Random Forest Ensemble: Pilot Study. Download PDF
Publication Type journal
Publisher Journal of Behavioural Informatics, Digital Humanities and Development Research
Publication Authors Malasowe, B.O, Edim, E.B, Adigwe, W, Okpor, M.D., Ako, R.E, Okpako, A.E, Ojugo, A.A. & Ojei, E.O.
Year Published 2024-03-01
Abstract Environmental factors and features often change to result in either harsh weather conditions or rainfall, which often calms the weather as well as provides fast, significant downstream hydrology known as runoff with a variety of implications such as erosion, water quality, and infrastructures. These, in turn, impact the quality of life, sewage systems, agriculture, and tourism of a nation, to mention a few. It chaotic, complex and dynamic nature has necessitated studies in the quest for future direction of such runoff via prediction models. With little successes in use of knowledge driven models – many studies have now turned to data-driven models. Dataset is retrieved from Metrological Center in Lagos, Nigeria for the period 1999–2023. The retrieved dataset was split: 70% for train dataset, and 30% for test dataset. Our study used the Random Forest ensemble. Result yields a sensitivity of 0.9, specificity 0.19, accuracy of 0.74, and improvement rate of 0.12. Other ensembles underperformed as compared to proposed model. Study reveals annual rainfall is an effect of variation cycle. Models will help simulate future floods and provide, lead time warnings in flood management.
Publication Title Co-infection prevalence of Covid-19 underlying tuberculosis disease using a susceptible infect clustering Bayes Network Download PDF
Publication Type journal
Publisher Dutse Journal of Pure and Applied Sciences (DUJOPAS).. The Faculty of Science, Federal University Dutse. Jigawa State, Nigeria.
Publication Authors Bridget Ogheneovo Malasowe Deborah Voke Ojie Arnold Adimabua Ojugo Margaret Dumebi Okpor
Year Published 2024-07-18
Abstract The adoption of data mining processes is urgently needed due to the everyday generation of large amounts of data at an accelerated rate. The current advancement in the area of data analytics and data science has ushered in a new paradigm shift in the use of machine learning and softcomputing approaches to a new paradigm to render a more beneficial approach in constructing algorithms that can effectively and efficiently assist expert systems to yield new insight to practitioners – to ensure comprehensive decisions on the underlying tuberculosis disease to potential problematic cases. This study explored spatial medical data in disease diagnosis to effectivevly and efficiently handle problematic cases of Tuberclulosisin Nigeria. Bayesian Network algorithm was used to predict potential cases in patients with covid-19 (and other underlying health issues) vis-à-vis its co-prevalence rate with Tuberculosis with data retrieved from the epidemiology laboratoryof the Asaba Federal Medical Centre, Delta State. Training and test versions of the data set were separated. Constructed model yields high prediction compared to previous studies in forecast of the prevalence co-infection rate. Results generated show that the confusion matrix model had sensitivity of 0.81, specificity 0.08, and prediction accuracy of 0.937 for data not originally used to train.
Publication Title Tackling Digital Degree in Education: Optimal Use of Green Information and Communication Technology (GICT) Download PDF
Publication Type journal
Publisher Advances in Multidisciplinary and Scientific Research Journal
Publication Authors Malasowe, B.O., Okpor, M.D. & Edim, B.E.
Year Published 2024-04-02
Abstract The COVID-19 pandemic has resulted in a significant increase in the use of Information and Communication Technology (ICT) in all areas of the education sector, particularly in developed economies as well as developing countries, regardless of preparedness. This is because, under the new normal, ICT adoption has become ubiquitous and fast-moving, even in the face of impending challenges. In the case of education, in particular, the disruption caused by the pandemic has caused ICT to become an instantaneous apparatus that has sustained the teaching and learning sector during the global lockdown that ravaged the world between 2019 and 2020, with consequences that are still visible today. Once more, the pandemic's outbreak made it clear to world leaders in numerous developing nations that they had no option but to use an ICT tool that was accelerating the growth of their countries' national knowledge bases. Notwithstanding the apparent difficulties integrating ICT into teaching and learning, the COVID-19 pandemic's effects accelerated the spread of ICT, forcing teachers and students in Nigeria and, in fact, around the world, to work online despite their readiness in terms of knowledge, abilities, and resources. In today's globalized world, ICT has become indispensable in filling gaps in the education sector, but it is also important to recognize the role of green information technology. This study examined how ICT instantly filled in the educational gaps during a pandemic-related lockdown, as well as how Green IT impacts our ecology. In order to truly close the digital divide that existed in the education sector in today's carefree world, the research has supplied the essential information and details, as well as recommendations for how to best use ICT tools to secure the ecosystem
Publication Title A Model of Android - Dependent Vehicle Monitoring System Download PDF
Publication Type journal
Publisher Dutse Journal of Pure and Applied Sciences (DUJOPAS). The Faculty of Science, Federal University Dutse. Jigawa State, Nigeria. DUTSE
Publication Authors F.O Aghware, D.V Ojie, B.O Malasowe
Year Published 2024-04-24
Abstract From a global perspective, the number of cars using our roads around-the-clock has increased dramatically, and this has tremendously amplified the insecurity on our roads. This has become a key subject, especially in Nigeria. Consequently, automobile trailing schemes are gradually becoming evident amongst common users in the transport sector in most major metropolises. This paper aims to showcase a developed Android-based application system for vehicle trailing schemes that integrates Google Maps real-time features, the “Global Positioning System (GPS), and employs the Global System for Mobile Communication (GSM)” technology. The GPS component is a space-based navigation system that runs on location and time data at all times, irrespective of place and time on the globe, provided there is a line of sight to any of the four or more GPS satellites. The time and location are displayed, utilising Google Maps, which serves as an interface with the application so that the user will be able to constantly monitor moving vehicles via the smartphone. Presented here are the designed model and the experimental outcome of the automobile trailing system that verifies the possibility of the system trailing the movement of vehicles from one location to another at any given time, as well as an interactive Graphical User Interface (GUI) for the Smartphone application.
Publication Title Analysis of Emerging Cybercrime Entrepreneurship and Its Implication in Nigeria Download PDF
Publication Type journal
Publisher Covenant Journal of Entrepreneurship (CJoE)
Publication Authors Okpako A. Ejaita, Malasowe O. Bridget, Mormah F. Ofuma & Chiemeke C. Stella
Year Published 2023-06-08
Abstract Emergingrealities in our society have glorified, celebrated and romanticized cybercriminals and their proceeds. This ugly and immoral societal acceptance of such criminal tendencies and their proceeds has extended the frontiers of Entrepreneurship due to its elastic nature to what is recently known as Cybercrime Entrepreneurship. Cybercrime Entrepreneurs on one hand, are experienced cybercriminals that sets up centers (virtual and physical) for teachingthem while on the second hand, they are successful, experienced and well-connected cyber criminals that set up ventures with enabling environment for less experienced individual to learn and efficiently carry out their criminal activities. This paper presents a review of theories of Entrepreneurship and their validity in understanding the recent disturbing publicity of Cybercrime Entrepreneurs and its subsequent indulgence by teenagers in Nigeria. The theories used are Economic factors theory by Joseph Schumpeter, Psychological factor theory by David Mccleland, Sociological factors theory by Thomas Cochranis and Alert Theory. It was observed that there are significant discontinuities and continuities in the configuration of cybercrime Entrepreneurship and traditional Entrepreneurship. The study concludes that Cyber Entrepreneurship is a function of psychological, sociological, criminological and economic factors and has negative implication to human capacity development of Nigeria. The research recommends amongst others that policy should be enacted to discourage the influx of youth into Cybercrime Entrepreneurship; punishment be explicitly spelt out in the law. Furthermore, government should also try to help our youths by engaging them positively to believethat there is dignity in labour.
Publication Title Fundamentals for Developing a National Database to Address Cyber Security Challenges in Nigeria: A Pilot Study Download PDF
Publication Type journal
Publisher Journal of Digital Innovations & Contemporary Research in Science, Engineering & Technolog
Publication Authors Malasowe, B.O.
Year Published 2024-02-12
Abstract This pilot study explores the fundamental requirements for establishing a national database aimed at addressing cyber security challenges in Nigeria. With the increasing frequency and sophistication of cyber threats, the need for a centralized repository of cyber-related data has become critical. This research employs systematic literature review approach to explore the fundamentals for developing a national database to address cyber security challenges in Nigeria. The SLR aims to synthesize existing research, identify gaps in the literature, and provide a robust foundation for the pilot study Findings indicate that a national database could significantly enhance threat intelligence sharing, incident response coordination, and policy formulation. Key imperatives identified include the establishment of robust data governance frameworks, collaboration between public and private sectors, and investment in infrastructure and training. The study concludes with recommendations for policymakers to prioritize the development of this database as a cornerstone of national cyber security strategy, ultimately fostering a more resilient digital environment in Nigeria.
Publication Title Cyber security issues on Soft Computing Techniques and Entrepreneurial Decision Making Process
Publication Type journal
Publisher
Publication Authors Malasowe, B. O
Year Published 2023-09-12
Abstract In an increasingly digital landscape, the intersection of cyber security and entrepreneurial decision- making has become a critical focus for businesses. This article explores the role of soft computing techniques in addressing cyber security issues within the entrepreneurial decision-making process. Soft computing methodologies, such as fuzzy logic, neural networks, and genetic algorithms, offer flexible and adaptive solutions that can enhance decision-making under uncertainty and risk. We analyze how these techniques can be integrated into cyber security strategies, enabling entrepreneurs to identify vulnerabilities, assess risks, and implement effective countermeasures. By examining case studies and real-world applications, this study highlights the benefits of incorporating soft computing into the decision-making framework, ultimately aiming to bolster cyber resilience in entrepreneurial ventures. The findings underscore the importance of proactive decision-making in the face of evolving cyber threats, providing a foundation for future research and practical applications in the field of cyber security and entrepreneurship