Publication Type journal
Publisher
Publication Authors Maitanmi Olusola a*, Malasowe Bridgetb , Emuobonuvie Erhinyoja Andyc, Adekunle Yinkad, Gregory Onwodie
Year Published 1-10
Abstract Neural network model is a model of brain’s cognitive process. Neural network originated as a model of how the brain works and has its beginnings in psychology. Today, neural network models are used to solve numerous problems associated with forecasting, pattern recognition, classification, manufacturing, medical diagnostic, signal processing, system control, checking, and modelling among others. This paper reveals the processes involved in using a neural network model in forecasting future events by effectively and efficiently utilizing extracted rules from trained neural networks and domain knowledge of the applied area. The structural method of operations and rules of extraction of neural networks were also discussed.
Publication Title Improved services traceability and management of a food value chain using block-chain network: a case of Nigeria
Publication Type journal
Publisher Indonesian Journal of Electrical Engineering and Computer Science
Publication Authors Maureen Ifeanyi Akazue, Rume Elizabeth Yoro, Bridget Ogheneovo Malasowe, Obinna Nwankwo, Arnold Arnold Ojugo
Year Published 3-01
Abstract Competitive asset markets and increased globalization have continued to ripple the food value chain with complex dynamics, which has led to a range of challenges such as food safety and quality, traceability, and overall supply chain inefficiency. These have further continued to endanger the general well-being of society. With rice as a staple food in Nigeria, the rice food supply value chain consists of a series of tasks, processes, and activities that are linked together from freshly harvested products to consumer demand and supply. Study advances the SmartRice, a sensor-based block-chain framework that decentralizes as well as provides a decision-support for the food supply value chain process by first ensuring that accurate data of harvested goods are reported, and passed on to a chain. The study advances a decentralized framework to eliminate various forms of fraud rippled across the existing centralized system, minimize corruption through its sensor-based layered model as well as minimize the error in reported data along the value chain.
Publication Title Assessing contributor features to phishing susceptibility amongst students of petroleum resources varsity in Nigeria
Publication Type journal
Publisher International Journal of Electrical and Computer Engineering (IJECE)
Publication Authors RE Yoro, FO Aghware, BO Malasowe, O Nwankwo, AA Ojugo
Year Published 4-01
Abstract In this observational quasi-experimental study, we recruited 200 participants during the Federal University of Petroleum Resources Effurun’s (FUPRE) orientation, who were exposed to socially engineered (phishing) attacks over nine months. Attacks sought to extract participants’ data and/or entice them to click (compromised) links. The study aims to determine phishing exposure and risks among undergraduates in FUPRE (Nigeria) by observing their responses to socially-engineered attacks and exploring their attitudes to cybercrime risks before and after phishing attacks. The study primed all students in place of cybercrime awareness to remain vigilant to scams and explored the various scam types with their influence on gender, age, status, and their perceived safety on susceptibility to scams. Results show that contrary to public beliefs, these factors have all been found to be associated with scam susceptibility and vulnerability of the participants.
Publication Type journal
Publisher International Journal of Advances in Computer Science and Technology
Publication Authors Maitanmi S. O, Ayinde, S.A, Adekola, O.D, Omotunde, A.O, Malasowe, B.O
Year Published 5-10
Abstract A plan specifying how family resources especially money and
time will be allocated or spent during a particular period is
called family budgeting. This research work covers an
impressive collaborative budgeting tool that lets you plan out
your spending habits either long term or short term, not
dwelling on the deluge of cash wasted in the past. This
application was built as a result of some everyday problems
like: daily accumulation of debts, lack of savings, financial
stress, among others. The software was built on short time
budgeting as regards the long time which is prevalent. In
addition, the software is highly processor demanding
especially when in use, the application cannot monitor users
with offline account and has to trust the user to input the
accurate values. The research work concluded by introducing
a new system that is user friendly, and efficient. On the
successful implementation of the new system, it is our belief
that masses will acquire this to better their standard of living.
Publication Type journal
Publisher Quest Journals Journal of Research in Humanities and Social Science
Publication Authors Malasowe Bridget, Awodele Oludele, Maitanmi Olusola, Emuobonuvie Andy
Year Published 0-04
Abstract In recent times, computer chip manufacturers are frantically racing to make the next microprocessor that will overthrow speed records. So Microprocessors made of silicon will eventually reach their limits of speed and miniaturization and their manufacturers will need a new material to produce faster computing speeds. But fortunately scientists have found the new material they need to build the next generation of microprocessors. Millions of natural supercomputers exist inside living organisms, including our body. DNA (deoxyribonucleic acid) molecules, the material our genes are made of, have the potential to perform calculations many times faster than the most powerful human-built computers. DNA might in the nearest future be integrated into a computer chip to create a so-called BIOCHIP that makes computers even faster. DNA molecules have already been harnessed to perform complex mathematical problems by researchers.While still in its early life,DNAcomputers will be capable of storing billions of times more data than today personal computer. In this article, a survey of recent research on DNA computing is discussed and the possibility that it might take the place of silicon-based computers in the next decade.
Publication Type journal
Publisher International Journal of advanced studies in Computer Science and Engineering
Publication Authors Malasowe Bridget O., Omotosho O. J. (Prof)
Year Published 1-12
Abstract The main ethical, legal, and social issues in bioinformatics research concerns who controls the acquisition of a person’s Genome and the information it contains; what are the uses of the information; and who decides how the information is used. The ethical and legal challenge is to fairly resolve the ownership, consent, and privacy questions so that individuas, consumers and the public will have confidence that results of bioinformatics sequencing carried out by bioinformaticians will benefit rather than harm them. A key foundational issue is determining who has dispositional rights over an individual’s health report. This research work surveys the current state of the art in ethical issues as it affects research in bioinformatics. The purpose of this Research work is to survey available ethical issues in Bioinformatic research. The intention is not to provide an exhaustive list. Rather, the intention is to identify well-established ethical issues that are used as ethical standard in Bioinformatic research.
Publication Type journal
Publisher International Journal of Advanced Studies in Computer Science and Engineering
Publication Authors Malasowe Bridget, S. A Idowu
Year Published 1-03
Abstract Mobile Database popularity is on the increasing by the secend as people need information while they are on the move in today fast changing world. This new technology allows users of mobile devices to connect to their corporate networks, collect the needed data, carry out theirr jobs while in disconnected mode and reconnect back to the network to synchronize with the corporate database. But the critical issue in mobile data management is to respond to real – time data access requirements of the supported application. However, it is difficult to handle real-time constraints in today mobile computing environment due to the physical constrains imposed by the mobile computer hardware and wireless network technology in use. The availability of the World Wide Web on mobile computing systems is expected to open up a new class of applications which provide location sensitive applications. The data is being moved closer to the applications in order to improve the performance and autonomy. These activities has lead to many problems in mobile Transactions. This paper surveys the current state of the art in Mobile Transactions Models. The survey focuses on recent types of Transaction Models proposed by some scholars.
Publication Title DESIGN AND IMPLEMENTATION OF A MOBILE BASED FUZZY EXPERT SYSTEM FOR PRE BREAST CANCER GROWTH PROGNOSIS
Publication Type journal
Publisher International Journal of Advanced Research in Computer Science
Publication Authors Malasowe Bridget O. (PhD, Awodele Oludele (Prof.), Okolie S. O. (Prof,), Omotosho O. J. (Prof.)
Year Published 5-01
Abstract Fuzzy logic has different approaches for enhancing personal health care delivery. Currently, breast cancer is rated as the second leading cause of death among women. Previous studies using fuzzy logic were directed at reoccurrence/survivability. However, there is need for early identification of the predisposing factors of the disease and its elimination. This study focuses on developing a Mobile-based Fuzzy Expert System (MFES) to predict an individual risk of initial cancer growth. The predisposing risk factors of breast cancer were elicited from four domain experts through direct contact; this was used to generate the fuzzy rules. The fuzzy inference approach was employed to formulate the membership functions.Mamdani approach was used for the system design. The system accommodates imprecision, tolerance and uncertainty to achieve tractability, robustness and low cost. Java expert system shell running on Android operating system was used to achieve the mobile technology aspect. For the purpose of system evaluation, 2500 data were collected from two health care centers in Nigeria using random sampling. The result indicated that the fact elicited from the experts served as range values for the 12 risk factors for fuzzification of the input and thus, 36 rules were generated. The rules were used for the system development. The developed MFES recorded 96% accuracy. It is therefore recommended that MFES be used to detect breast cancer risk levels early enough. The main contribution of this work is to reduce the incidence rate in contrast to the existing methods currently applied in the diagnosis of breast cancer.
Publication Title DESIGN AND IMPLEMENTATION OF A REAL-TIME VEHICLE TRACKING SYSTEM
Publication Type journal
Publisher INTERNATIONAL JOURNAL OF RESEARCH IN COMMERCE, IT & MANAGEMENT
Publication Authors MAITANMI OLUSOLA STEPHEN, OGUNLERE SAMSON OJO, DR. ADEKUNLE YINKA, GREGORY ONWODI & MALASOWE BRIDGET
Year Published 9-10
Abstract Security in general is a major concern in our society today and over time, the security of vehicles has become a priority. Various inventions and technologies have
been brought about to put minds at rest, but the complete eradication of theft of cars is much of a tedious task. A solution to knowing the location of vehicles
either when they are stolen or for any other reasons. To know this location, it involves the installation of a vehicle tracker in a hidden position in the vehicle so
that it is not easily seen while providing essential clues as to the location of the vehicle and also a remote tracking server that receives the location information of
the car in longitude and latitude and converts it to a physical address and sends it to the authorized user.
Publication Type journal
Publisher International Journal of Engineering and Innovative Technology (IJEIT)
Publication Authors Adekunle, Y.A, Maitanmi, S.O, Malasowe, B.O, Osundina, S. A
Year Published 4-10
Abstract In an attempt to gain a competitive edge, businesses are increasingly looking for new and innovative ways to cut costs while maximizing profits especially now that the world is experiencing economic downturn. Firms recognize that they need to grow and as a result are under pressure to save money. This has forced the realization that new ideas and methods may produce better results than the tried and tested formulas of old. It is the growing acceptance of innovative technologies that has seen cloud computing become a realizable innovation in information technology (IT). Many have heard of cloud computing, but far fewer actually understand what it is and, more importantly, how it can benefit them. In this research paper, we focused on the economics of cloud rather than technologies; we outline the underlying business benefits it can bring to various users and the economics of scale focusing on what makes it truly different from client/server.
Publication Title Empirical evidence of phishing menace among undergraduate smartphone users in selected universities in Nigeria
Publication Type journal
Publisher Indonesian Journal of Electrical Engineering and Computer Science
Publication Authors Maureen Ifeanyi Akazue, Arnold Adimabua Ojugo, Rume Elizabeth Yoro, Bridget Ogheneovo Malasowe, Obinna Nwankwo
Year Published 2-01
Abstract In our exploratory quasi-experimental study, 480-student were recruited and exposed to social engineering directives during a university orientation week. The directives phishing attacks were performed for 10 months in 2021. The contents attempted to elicit personal user-data from participants, enticing them to click compromised links. The study aimed to determine cybercrime risks among undergraduates in selected universities in Nigeria, observe responses to socially-engineered attacks, and explore their attitudes to cybercrime risks before/after such attacks. The study generalized that all participants have great deal awareness of cybercrime, and also primed all throughout study to remain vigilant to scams. The study explores various types of scam and its influence on students’ gender and age on perceived safety on susceptibility to phishing scams. Results show that contrary to public beliefs, none of these factors were associated with scam susceptibility and vulnerability rates of the participants.
Publication Title Imperatives for the Establishment of a National Database to Address Security Issues in Nigeria.
Publication Type conference
Publisher isteams NEXUS conference
Paper Link www.isteams.org
Publication Authors Maitanmi, S. O, Malasowe B.O., Emuobonuvie E. A.
Year Published 1-04
Abstract The status of Nigerian security challenges should be one of the popular tales by moon light to all growing children in every home. This would enable them to run and fly as against crawling and walking when exposed to dangers. This paper focuses on the survey of the benefits surrounding the creation of central national database in Nigeria. Presently, Nigeria is critically facing security challenges because people are not uniquely identified and tagged. The situation has led to insecurity in Nigeria with different trends and dimensions from one geopolitical zone to the other. For example, this has led to various faceless activities such as Islamic sect popularly known as Boko Haram in Nigeria, rampant armed robbery everywhere, notorious robbery and kidnapping in the South-East and South-South, corruption and unemployment are all over, uncontrollable/unidentifiable immigrants, unaccountable birth/death rates in hospital/healthcare centers, and reckless drivers that had claimed more lives than help. To control such devastating effects in Nigeria, central national database must be created to solving identity challenges, tackle loose neighboring borders, labels sectional terrorist, detain corruption leaders, criminals will be identified through database resources. The paper therefore highlight the process by which a central database can control the above listed challenges in Nigeria.
Publication Title GREENING THE CAMPUS-DESIGN OF A GENERIC GREEN IT MODEL FOR POSSIBLE ADOPTION. (A CASE STUDY OF AN EDUCATIONAL INSTITUTION IN NIGERIA)
Publication Type journal
Publisher Asian Journal of Computer Science and Information Technology
Paper Link www.innovativejournal.in
Publication Authors Awodele Oludele, Malasowe Bridget O., Onuiri Ernest E.
Year Published 1-04
Abstract Society’s reliance on Information Technology (IT) has increased tremendously in the last few decades. Unfortunately, the growth of the IT sector has seemingly occurred at the expense of the environment. The adverse environmental impact of IT operations is partly due to the production and disposal of IT equipment, which gives rise to the release of harmful pollution agents and toxic materials into the environment. The push for carbon footprint reduction by the international community and the realization by major IT organizations on the adverse effect of their operations on the environment are forces behind the evolution of the green IT framework. This reasearch work focuses on measuring the Carbon Footprint of an educational institution in Nigeria and the design of a Generic Green IT Model for possible adoption. The scopes laid out by the GHG (Greenhouse Gas) Protocol was adopted for this research. The CO2 emission from Scope 1 ( Fuel and diesel consumption on campus), scope 2 (purchased electricity) and scope 3 (staff and student commuting) were calculated respectively. Emission factor–based calculation approach was used to calculate the CO2 emission of the institution (WRI – World Resources Institute). The result of this calculation was used to design a Generic Green IT Model.
Publication Title Improved services traceability and management of a food value chain using block-chain network: a case of Nigeria
Publication Type journal
Publisher Indonesian Journal of Electrical Engineering and Computer Science
Publication Authors Maureen Ifeanyi Akazue, Rume Elizabeth Yoro, Bridget Ogheneovo Malasowe, Obinna Nwankwo, Arnold Adimabua Ojugo
Year Published 3-01
Abstract Competitive asset markets and increased globalization have continued to ripple the food value chain with complex dynamics, which has led to a range of challenges such as food safety and quality, traceability, and overall supply chain inefficiency. These have further continued to endanger the general well-being of society. With rice as a staple food in Nigeria, the rice food supply value chain consists of a series of tasks, processes, and activities that are linked together from freshly harvested products to consumer demand and supply. Study advances the SmartRice, a sensor-based block-chain framework that decentralizes as well as provides a decision-support for the food supply value chain process by first ensuring that accurate data of harvested goods are reported, and passed on to a chain. The study advances a decentralized framework to eliminate various forms of fraud rippled across the existing centralized system, minimize corruption through its sensor-based layered model as well as minimize the error in reported data along the value chain.
Publication Type journal
Publisher IJASCSE
Paper Link www.ijascse.org
Publication Authors Maitanmi Olusola, Adekunle Yinka, Malasowe Bridget, Gregory Onwodi
Year Published 1-03
Abstract Eradicating extreme poverty continues to be one of the major challenges of developing countries like Nigeria, and is a major concern of the international community.
Ending this menace will require the combined efforts of everybody. This is why information technology will remain a vehicle to Millennium Development Goals in this dispensation. This paper sets out as an evaluation of existing developments, and researches done comparing it to the expected goals set by European Union. To achieve this, the writers discourse the different roles information communication technology (ICTs) can play in reducing poverty, providing education and quality healthcare services for all, promoting gender equality and coping with environmental change and extreme climate events. The writers proffer solutions to all area of weaknesses which would help to facilitate the achievement of the stated goals come 2015.
Publication Type journal
Publisher International Journal of Advanced Research in Computer Science
Paper Link www.ijarcs.info
Publication Authors Malasowe Bridget O. (PhD) and Emuobonuvie Andy
Year Published 0-01
Abstract Carbon Productivity, Green Information Technology (GIT), Environmental Sustainability, Green Information System (GIS), Data
Centre, CO2 Emission
Publication Type journal
Publisher International Journal of Computer (IJC)
Publication Authors Maitanmi Olusola Stephen, Adekunle Yinka, Adio Adesina Kamorudeen, Onwodi Gregory, Malasowe Bridget
Year Published 1-19
Abstract Information retrieval System (IRS) is often defined as the location and delivery of documents to a user to satisfy their information needs. IR is the area of study concerned with searching for documents, for information within documents, and for metadata about documents, as well as that of searching structured storage, relational databases, and the worldwide web. There is an overlap in the usage of the terms data retrieval, document retrieval, information retrieval, and text retrieval. IR is interdisciplinary; based on computer science, mathematics, library science, information science, informationarchitecture, cognitive psychology, linguistics, statistics and law. Automated information retrieval systems are used to reduce what has been called information overload. Many universities and public libraries use IR system to provide access to books, journals and other documents. Web search engines are the most visible IR applications. This article is the design and implementation of information retrieval system that deals with this aspect of the institution’s administration by providing an easy to use computerized application to assist in retrieving information.
Publication Title THE BORDERLESS WORLD-INFORMATION AND COMMUNICATION TECHNOLOGY (GREEN); BRIDGING DIGITAL GAP IN EDUCATION.
Publication Type conference
Publisher Association for Digital Education and Communications Technology Conference Proceedings
Paper Link https://open.library.okstate.edu/adect2021/
Publication Authors AGHWARE F. O (PHD), MALASOWE B. O (PHD) AND OJIE D. V
Year Published 1-04
Abstract A colossal causatum of the COVID-19 sudden happening is the radical global embrace of Information and Communication Technology (ICT) in all spheres of the education sector especially in developed economies regardless the preparedness. Going by the new normal kind of, irrespective of the imminent challenges of its prior ubiquitous adoption, there is now a swift resultant ICT inclusion in which the economy is wholly driven by ICT. Notably in education, the COVID -19 disruption scaled up ICT as an instantaneous apparatus to subsist the teaching and learning sector during the universal lockdown which ravaged the whole world between 2019 through 2020 of which the impact still evident. Again, the out break of the Pandemic revealed to many world leaders in many developing countries that they had no choice than to embrace an ICT instrument propelling the development of national knowledge-base. Regardless the superficial hitches in ICT integration in teaching and learning, the effects of the COVID-19 pandemic fast tracked ICT penetration hence today, teachers and students in Nigeria and in deed worldwide had no choice than to work online notwithstanding their preparedness in terms of knowledge, skills and resources for the implemetation ICT in teaching and learning. In as much as ICT has come to stay in bridging the gaps in the education sector to in today bortherless world, the place of Green Information Technology must be acknowledged. This research paper addresed how ICT instantaneously bridged the educational gaps in a pandemic inclusive lockdown; and addressing Green IT as it affects our ecosystem. The research has provided the necessary information and details why there should be compulsory implementation of ICT in education to truely bridge the digital gap that existed in the education sector in our today botherless world thus proffering how best to deploy the ICT tools in securing the ecosystem.
Publication Title Adaptive Learner-CBT with Secured Fault-Tolerant and Resumption Capability for Nigerian Universities
Publication Type journal
Publisher (IJACSA) International Journal of Advanced Computer Science and Applications
Paper Link www.ijacsa.thesai.org
Publication Authors Bridget Ogheneovo Malasowe; Maureen Ifeanyi Akazue; Ejaita Abugor Okpako; Fidelis Obukohwo Aghware; Arnold Adimabua Ojugo; Deborah Voke Ojie
Year Published 2023-09-09
Abstract The post covid-19 studies have reported significant negative impact witnessed on global education and learning with the closure of schools’ physical infrastructure from 2020 to 2022. Its effects today continues to ripple across the learning processes even with advances in e-learning or media literacy. The adoption and integration therein of e-learning on the Nigerian frontier is yet to be fully harnessed. From traditional to blended learning, and to virtual learning – Nigeria must rise, and develop new strategies to address issues with her educational theories as well as to bridge the gap and negative impact of the post covid-19 pandemic. This study implements a virtual learning framework that adequately fuses the alternative delivery asynchronous-learning with traditional synchronous learning for adoption in the Nigerian Educational System. Result showcases improved cognition in learners, engaged qualitative learning, and a learning scenario that ensures a power shift in the educational structure that will further equip learners to become knowledge producer, help teachers to emancipate students academically, in a framework that measures quality of engaged student’s learning.
Publication Type journal
Publisher
Publication Authors Emuobonuvie E. Andya*, Malasowe O. Bridget, Okeh O. Dono, Adeyemi B. Benjaminb
Year Published 2020-02-12
Abstract The high demand for face recognition applications has attracted the interest of researchers in this area. As a result of this, several methodologies have been proposed by scholars in this field. Face recognition methodology aims to detect faces in still image and sequence images. Local, global, and hybrid are approaches used in this area. The major issue of face recognition includes intensity, illumination, difficult to control as well as pose. Face images are highly dynamic and they pose difficult issues and challenges to solve when in use, researchers in pattern recognition, computer vision, and artificial intelligence have proposed many models in other to reduce such difficulties to improve the efficiency, robustness, and accuracy. The objective of this paper is to provide a survey of the current state of research on face recognition methodologies that has been proposed by different researchers. The underlining principles and application areas of face recognition are also presented. Finally, a conclusion on the current state of the art in face recognition was given.
Publication Title Fuzzyfication of the Decision Making Process - Theoretical and Conceptual Antecedents
Publication Type journal
Publisher Advances in Multidisciplinary and Scientific Research
Paper Link https://www.isteams.net/aimsjournal
Publication Authors Malasowe, Bridget Ogheneovo & Emuobonuvie, Andy
Year Published 2022-09-10
Abstract Fuzzy logic has seen tremendous advancements in the last few decades and is now widely used in a
variety of real-world contexts, including control systems, pattern recognition, data mining, and
classification, among other fields. Entrepreneurs face significant hurdles in juggling ambiguity and risk
while making decisions, making it difficult for them to make the optimal choice. Forecasting business
choices and operations is becoming increasingly challenging due to the growing complexity and
complexities of corporate environments. Fuzzification is the process of using the data in the knowledge
base to transform a crisp input value into a fuzzy value. This study looked at the decision-making
process' fuzzification from theoretical and conceptual angles. When information is scarce and of low
quality, fuzzy logic provide a natural method for solving multidimensional and difficult problems.