Joseph Bamidele AWOTUNDE

@unilorin.edu.ng

Lecturer, Faculty of Communication and Information Sciences
Lecturer, Faculty of Communication and Information Sciences
Department of Computer Science, University of Ilorin, Ilorin, Nigeria



                             

https://researchid.co/jabbamidele

J. B. Awotunde was born in Ayetoro-Ile Town, Ilorin, Kwara State, Nigeria in 1982. He received the B.Sc. degree in Mathematics/Computer Science from Federal University of Technology, Minna, Nigeria, in 2007. M.Sc. and Ph.D. degrees in Computer Science from the University of Ilorin, Ilorin, Nigeria, in 2014 and 2019 respectively. From 2012 to 2015, and 2018, he was a Computer Science Instructor with the University School, University of Ilorin, Ilorin, Nigeria. From 2017 to 2018, he was a Lecturer II with the McPherson University, Ijebo, Seriki-Sotayo, Nigeria. Since 2019, he has been a Lecturer II with the Computer Science Department, University, of Ilorin, Ilorin, Nigeria. He is the author of more than 40 articles, and more than 15 Conference Proceedings. His research interests include Information Security, Cybersecurity, Bioinformatics Artificial Intelligence, Internet of Medical Things, Wireless Body Sensor Networks, Wireless Networks, Telemedicine, m-Health/e-health, and Medical Ima

EDUCATION

• University of Ilorin, Ilorin, Kwara State 2015 – 2019
• University of Ilorin, Ilorin, Kwara State 2012 – 2014
• Federal University of Technology, Minna, Niger State 2003 – 2007
• The Federal Polytechnic, Bida, Niger State 1999 – 2000
• Government Secondary School, Share 2001

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Science, Computer Networks and Communications, Information Systems and Management, Artificial Intelligence

210

Scopus Publications

3697

Scholar Citations

33

Scholar h-index

104

Scholar i10-index

Scopus Publications

  • Evolution of machine learning applications in medical and healthcare analytics research: A bibliometric analysis
    Samuel-Soma M. Ajibade, Gloria Nnadwa Alhassan, Abdelhamid Zaidi, Olukayode Ayodele Oki, Joseph Bamidele Awotunde, Emeka Ogbuju, and Kayode A. Akintoye

    Elsevier BV

  • A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security
    Abidemi Emmanuel Adeniyi, Rasheed Gbenga Jimoh, and Joseph Bamidele Awotunde

    Elsevier BV

  • A neuro-fuzzy security risk assessment system for software development life cycle
    Olayinka Olufunmilayo Olusanya, Rasheed Gbenga Jimoh, Sanjay Misra, and Joseph Bamidele Awotunde

    Elsevier BV

  • Ontology-Based Layered Rule-Based Network Intrusion Detection System for Cybercrimes Detection
    Femi Emmanuel Ayo, Joseph Bamidele Awotunde, Lukman Adebayo Ogundele, Olakunle Olugbenga Solanke, Biswajit Brahma, Ranjit Panigrahi, and Akash Kumar Bhoi

    Springer Science and Business Media LLC

  • A Lightweight Image Cryptosystem for Cloud-Assisted Internet of Things
    Esau Taiwo Oladipupo, Oluwakemi Christiana Abikoye, and Joseph Bamidele Awotunde

    MDPI AG
    Cloud computing and the increasing popularity of 5G have greatly increased the application of images on Internet of Things (IoT) devices. The storage of images on an untrusted cloud has high security and privacy risks. Several lightweight cryptosystems have been proposed in the literature as appropriate for resource-constrained IoT devices. These existing lightweight cryptosystems are, however, not only at the risk of compromising the integrity and security of the data but also, due to the use of substitution boxes (S-boxes), require more memory space for their implementation. In this paper, a secure lightweight cryptography algorithm, that eliminates the use of an S-box, has been proposed. An algorithm termed Enc, that accepts a block of size n divides the block into L n R bits of equal length and outputs the encrypted block as follows: E=L⨂R⨁R, where ⨂ and ⨁ are exclusive-or and concatenation operators, respectively, was created. A hash result, hasR=SHA256P⨁K, was obtained, where SHA256, P, and K are the Secure Hash Algorithm (SHA−256), the encryption key, and plain image, respectively. A seed, S, generated from enchash=Enchashenc,K, where hashenc is the first n bits of hasR, was used to generate a random image, Rim. An intermediate image, intimage=Rim⨂P, and cipher image, C=Encintimage,K, were obtained. The proposed scheme was evaluated for encryption quality, decryption quality, system sensitivity, and statistical analyses using various security metrics. The results of the evaluation showed that the proposed scheme has excellent encryption and decryption qualities that are very sensitive to changes in both key and plain images, and resistance to various statistical attacks alongside other security attacks. Based on the result of the security evaluation of the proposed cryptosystem termed Hash XOR Permutation (HXP), the study concluded that the security of the cryptography algorithm can still be maintained without the use of a substitution box.

  • EfficientNets transfer learning strategies for histopathological breast cancer image analysis
    Sakinat Oluwabukonla Folorunso, Joseph Bamidele Awotunde, Y. Pandu Rangaiah, and Roseline Oluwaseun Ogundokun

    World Scientific Pub Co Pte Ltd
    Breast cancer (BC) is one of the major principal sources of high mortality among women worldwide. Consequently, early detection is essential to save lives. BC can be diagnosed with different modes of medical images such as mammography, ultrasound, computerized tomography, biopsy, and magnetic resonance imaging. A histopathology study (biopsy) that results in images is often performed to help diagnose and analyze BC. Transfer learning (TL) is a machine-learning (ML) technique that reuses a learning method that is initially built for a task to be applied to a model for a new task. TL aims to enhance the assessment of desired learners by moving the knowledge contained in another but similar source domain. Consequently, the challenge of the small dataset in the desired domain is reduced to build the desired learners. TL plays a major role in medical image analysis because of this immense property. This paper focuses on the use of TL methods for the investigation of BC image classification and detection, preprocessing, pretrained models, and ML models. Through empirical experiments, the EfficientNets pretrained neural network architectures and ML classification models were built. The support vector machine and eXtreme Gradient Boosting (XGBoost) were learned on the BC dataset. The result showed a comparative but good performance of EfficientNetB4 and XGBoost. An outcome based on accuracy, recall, precision, and F1_Score for XGBoost is 84%, 0.80, 0.83, and 0.81, respectively.

  • Bot-FFX: A Robust and Efficient Framework for Fast Flux Botnet (FFB) Detection
    Femi Emmanuel Ayo, Joseph Bamidele Awotunde, Sakinat Oluwabukonla Folorunso, Ranjit Panigrahi, Amik Garg, and Akash Kumar Bhoi

    Springer Science and Business Media LLC

  • Empirical analysis of tree-based classification models for customer churn prediction
    Fatima E. Usman-Hamza, Abdullateef O. Balogun, Salahdeen K. Nasiru, Luiz Fernando Capretz, Hammed A. Mojeed, Shakirat A. Salihu, Abimbola G. Akintola, Modinat A. Mabayoje, and Joseph B. Awotunde

    Elsevier BV

  • A hybrid correlation-based deep learning model for email spam classification using fuzzy inference system
    Femi Emmanuel Ayo, Lukman Adebayo Ogundele, Solanke Olakunle, Joseph Bamidele Awotunde, and Funmilayo A. Kasali

    Elsevier BV

  • Machine learning assisted snort and zeek in detecting DDoS attacks in software-defined networking
    Muyideen AbdulRaheem, Idowu Dauda Oladipo, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Cheng-Chi Lee, Ghaniyyat Bolanle Balogun, and Joshua Oluwatobi Adeoti

    Springer Science and Business Media LLC

  • Big data analytics enabled deep convolutional neural network for the diagnosis of cancer
    Joseph Bamidele Awotunde, Ranjit Panigrahi, Shubham Shukla, Baidyanath Panda, and Akash Kumar Bhoi

    Springer Science and Business Media LLC

  • Development of a Hybrid Deep Learning Model for Car Crash Prediction Using Driver’s Behavioral Pattern
    Halleluyah Oluwatobi Aworinde, Biswajit Brahma, Abidemi Emmanuel Adeniyi, Oduayo Dauda Olanloye, Joseph Bamidele Awotunde, Mrakpor Emuejevoke Osamede, and Hemanta Kumar Bhuyan

    Springer Nature Switzerland

  • A Smart Blockchain Model for Supply Chain Management System
    Femi Emmanuel Ayo, Joseph Bamidele Awotunde, Sanjay Misra, and Akshat Agrawal

    Springer Nature Singapore

  • E-Medical Administration: An Automated Healthcare Management System
    Joseph Bamidele Awotunde, Sanjay Misra, Thairu Olanrewaju Abdullahi, and Akshat Agrawal

    Springer Nature Singapore

  • Comparative Analysis of CNN and SVM Machine Learning Techniques for Plant Disease Detection
    Abidemi Emmanuel Adeniyi, Olugbenga Ayomide Madamidola, Joseph Bamidele Awotunde, Sanjay Misra, and Akshat Agrawal

    Springer Nature Singapore

  • Personalized Music Recommendation System Based on Machine Learning and Collaborative Filtering
    Joseph Bamidele Awotunde, Moses Kazeem Abiodun, Abidemi Emmanuel Adeniyi, Bakare Hameed Abiodun, Jide Kehinde Adeniyi, Dayo Rueben Aremu, Ayodele A Adebiyi, and Oladayo G. Atanda

    IEEE
    There is an abundance of music content available to listeners across numerous platforms as a result of the music industry's digital transition. Users have the problem of navigating this huge musical landscape to find songs that resonate with their unique preferences when they have millions of songs at their fingertips. This paper presents a machine learning-based music recommendation system. The system takes into account various factors such as user preferences and music genre. The recommendation system is based on recent advancements in machine learning and uses collaborative filtering to provide personalized music recommendations for each user. The system is tested using publicly available datasets and achieves satisfactory results. The paper first provides an overview of existing music recommendation systems and their shortcomings. It then outlines the principles of machine learning to explain the process of personalized music recommendation. It describes the various stages in the recommendation process such as data collection, data preprocessing, feature selection, model selection, model training, model testing, and validation. The system is tested with publicly available datasets and the results are compared with existing recommendation systems. The results show that the proposed system achieves a satisfactory performance in comparison to the existing recommendation systems. Furthermore, it is observed that the system is able to recommend personalized music to users.

  • A web-based biometric system for e-voting
    Moses Kazeem Abiodun, Jide Kehinde Adeniyi, Abidemi Emmanuel Adeniyi, Joseph Bamidele Awotunde, Dayo Rueben Aremu, Olabode Samuel, Ayodele A Adebiyi, and Oladayo G. Atanda

    IEEE
    Voting is an important activity, and it is an inevitable event in our everyday life. Voting has been conducted in various ways some of which are the use of ballot papers or raising of hands and further collating its statistics manually. The election process in Nigeria has a lot of vulnerabilities, ranging from when the users are casting their votes manually to when the votes are being counted by officials. In previous years Nigerian elections has had a lot of controversy concerning its accuracy and efficiency.The major reason for this research is to reduce the rate of corruption in voting and further make it easier for citizens of Nigeria to cast their votes. An electronic voting system is proposed that make use of two-level authentication system, the National Identification Number (NiN) and the facial recognition of voters. The system was implemented using technologies like HTML (Hypertext Markup Language), CSS (Cascade Styling Sheet), JS (JavaScript) language used for the client-side and node JS (JavaScript) used on the server-side. Mongo DB was used as the database.The results of evaluation of the system are very encouraging, 87.7% of the respondent attest to how the integration of the application and its functionality. There was a positive respond for determining the speed of page transition. 87.7% says the loading time of the web application is very good.Based on the evaluation of this system and its performance, the e-voting system is therefore recommended to be used in Nigeria for next election.

  • Application of Computer Vision Approach for Automation and Classification of Fashion Store
    Aminat Adebayo, Moses Kazeem Abiodun, Ifeoluwa Temitayo Awoniran, Abidemi Emmanuel Adeniyi, Joseph Bamidele Awotunde, Jide Kehinde Adeniyi, and Dayo Rueben Aremu

    IEEE
    The fashion industry has long been interested in utilizing computer vision techniques to automate tasks such as recognizing different types of clothing items in images. This study proposed a novel convolutional neural network (CNN) architecture for the classification of fashion outfits into three categories: shoes, sunglasses, and trousers. The proposed CNN architecture is based on state-of-the-art deep learning techniques and is trained on a fairly large-scale dataset of fashion images. The effectiveness of the proposed CNN architecture is evaluated through extensive experiments and analysis. The result demonstrates that the proposed CNN architecture achieves a high accuracy rate of 0.99 on each diagonal value of the confusion matrix. This indicates that the proposed CNN is capable of accurately classifying each item type with high accuracy. Additionally, the study investigates the impact of various hyperparameters on the performance of the proposed CNN architecture and found that the model which uses a 7x7 filter size and 64 filter number yields higher accuracy compared to other filter combinations. The study demonstrates the potential of CNN in automating fashion item recognition, which can lead to improved efficiency and accuracy in the fashion industry. It can also form the basis for developing more advanced computer vision systems for the fashion industry.

  • Comparative analysis of Machine Learning Techniques for the Detection of Heart Disease
    Jide Kehinde Adeniyi, Tunde Taiwo Adeniyi, Emmanuel Abidemi Adeniyi, Moses Kazeem Abiodun, and Joseph Bamidele Awotunde

    IEEE

  • Computational Models Enabling Smart Teaching and Learning in Wireless Communication Systems
    Abidemi Emmanuel Adeniyi, Rasheed Gbenga Jimoh, Joseph Bamidele Awotunde, Mukaila Olagunju, Deborah Olufemi Ninan, Odunayo Dauda Olanloye, Halleluyah Oluwatobi Aworinde, and Abdulrauf Olarenwaju Babatunde

    CRC Press

  • An Enhanced Lightweight Cryptographic Algorithm Towards Securing Wireless Networks and Big Data
    Joseph Bamidele Awotunde, Abidemi Emmanuel Adeniyi, Abdulrauf Olarenwaju Babatunde, Mukaila Olagunju, Agbotiname Lucky Imoize, and Odunayo Dauda Olanloye

    CRC Press

  • Deep Transfer Learning Models for Mobile-Based Ocular Disorder Identification on Retinal Images
    Roseline Oluwaseun Ogundokun, Joseph Bamidele Awotunde, Hakeem Babalola Akande, Cheng-Chi Lee, and Agbotiname Lucky Imoize

    Tech Science Press

  • Retraction Note: Crypto-Stegno based model for securing medical information on IOMT platform (Multimedia Tools and Applications, (2021), 80, 21-23, (31705-31727), 10.1007/s11042-021-11125-2)
    Roseline Oluwaseun Ogundokun, Joseph Bamidele Awotunde, Emmanuel Abidemi Adeniyi, and Femi Emmanuel Ayo

    Springer Science and Business Media LLC

  • An Extended Moore-Neighbour Tracing Algorithm for Ear Segmentation in a Multi-Feature Ear Recognition System
    Jide Kehinde Adeniyi, Ahmed Babajide Olanrewaju, Abidemi Emmanuel Adeniyi, Biswajit Brahma, Joseph Bamidele Awotunde, and Hemanta Kumar Bhuyan

    IEEE
    Ear recognition is an example of a biometric system that uses human biological traits for recognition. This kind of recognition has been recently examined due to its distinctive properties such as its invariant shape. When performing analysis on image processing or pattern recognition, one of the major problems encountered is the number of features involved. It is necessary to extract a well-defined feature to make the classification process more efficient. Hence, this paper aims to propose an ear recognition system that extracts two features from the human ear: textural and geometrical features. This is aimed at improving the accuracy of the biometric trait. The extracted features were saved as a template and used for matching. The proposed system was evaluated with two online ear image datasets (AMI Ear database and USTB Ear database) and it produced an accuracy of 98.15.

  • Performance evaluation of federated learning algorithms using breast cancer dataset
    Sakinat Oluwabukonla Folorunso, Joseph Bamidele Awotunde, Abdullahi Abubakar Kawu, and Oluwatobi Banjo

    Elsevier

RECENT SCHOLAR PUBLICATIONS

  • Analysis of integration of IoMT with blockchain: issues, challenges and solutions
    T Mazhar, SFA Shah, SA Inam, JB Awotunde, MM Saeed, H Hamam
    Discover Internet of Things 4 (1), 1-36 2024

  • Intrusion Detection: A Comparison Study of Machine Learning Models Using Unbalanced Dataset
    SA Ajagbe, JB Awotunde, H Florez
    SN Computer Science 5 (8), 1028 2024

  • Evolution of machine learning applications in medical and healthcare analytics research: A bibliometric analysis
    SSM Ajibade, GN Alhassan, A Zaidi, OA Oki, JB Awotunde, E Ogbuju, ...
    Intelligent Systems with Applications, 200441 2024

  • 12 An Cryptographic Enhanced Lightweight Algorithm Towards Securing Wireless Networks and Big Data
    JB Awotunde, AE Adeniyi, AO Babatunde, M Olagunju, AL Imoize, ...
    Computational Modeling and Simulation of Advanced Wireless Communication 2024

  • Cybersecurity in Emerging Healthcare Systems
    AL Imoize, C Meshram, JB Awotunde, Y Farhaoui, DT Do
    IET 2024

  • Blockchain for secured cybersecurity in emerging healthcare systems
    AE Adeniyi, RG Jimoh, JB Awotunde, HO Aworinde, PB Falola, DO Ninan
    2024

  • A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security
    AE Adeniyi, RG Jimoh, JB Awotunde
    Computers and Electrical Engineering 118, 109330 2024

  • Comparative Analysis of Various Machine Learning Techniques Applied Towards Intrusion Detection in Computer Networks
    GB Balogun, OS Babade, JBA Awotunde, M Abdulraheem, ID Oladipo
    Journal of Computing and Communication 3 (2), 31-54 2024

  • Retraction Note: Crypto-Stegno based model for securing medical information on IOMT platform
    RO Ogundokun, JB Awotunde, EA Adeniyi, FE Ayo
    Multimedia Tools and Applications, 1-1 2024

  • A neuro-fuzzy security risk assessment system for software development life cycle
    OO Olusanya, RG Jimoh, S Misra, JB Awotunde
    Heliyon 10 (13) 2024

  • An Extended Moore-Neighbour Tracing Algorithm for Ear Segmentation in a Multi-Feature Ear Recognition System
    JK Adeniyi, AB Olanrewaju, AE Adeniyi, B Brahma, JB Awotunde, ...
    2024 International Conference on Advances in Modern Age Technologies for 2024

  • An Enhanced Hybrid Cryptography Model for Online Banking Authentication and Security
    JB Awotunde, B Brahma, AE Adeniyi, E Lauretta Nkonyeasua, AL Imoize, ...
    International Conference on Connected Objects and Artificial Intelligence 2024

  • Breast Cancer Detection and Classification from Mammogram Images Using Improved Convolutional Neural Network Model
    OD Olanloye, AE Adeniyi, HO Aworinde, JB Awotunde, AL Imoize, ...
    International Conference on Connected Objects and Artificial Intelligence 2024

  • A Mobile Visitor Management System Using a QR Code and PIN for Access Control
    JB Awotunde, AE Adeniyi, AL Imoize, Y Mejdoub, Z Abdualazizu
    International Conference on Connected Objects and Artificial Intelligence 2024

  • Bot-FFX: A Robust and Efficient Framework for Fast Flux Botnet (FFB) Detection
    FE Ayo, JB Awotunde, SO Folorunso, R Panigrahi, A Garg, AK Bhoi
    Wireless Personal Communications, 1-24 2024

  • Cascade Generalization-Based Classifiers for Software Defect Prediction
    AT Bashir, AO Balogun, MO Adigun, SA Ajagbe, LF Capretz, JB Awotunde, ...
    Computer Science On-line Conference, 22-42 2024

  • EfficientNets transfer learning strategies for histopathological breast cancer image analysis
    SO Folorunso, JB Awotunde, YP Rangaiah, RO Ogundokun
    International Journal of Modeling, Simulation, and Scientific Computing 15 2024

  • A web-based biometric system for e-voting
    MK Abiodun, JK Adeniyi, AE Adeniyi, JB Awotunde, DR Aremu, O Samuel, ...
    2024 International Conference on Science, Engineering and Business for 2024

  • Comparative analysis of Machine Learning Techniques for the Detection of Heart Disease
    JK Adeniyi, TT Adeniyi, EA Adeniyi, MK Abiodun, JB Awotunde
    2024 International Conference on Science, Engineering and Business for 2024

  • Application of Computer Vision Approach for Automation and Classification of Fashion Store
    A Adebayo, MK Abiodun, IT Awoniran, AE Adeniyi, JB Awotunde, ...
    2024 International Conference on Science, Engineering and Business for 2024

MOST CITED SCHOLAR PUBLICATIONS

  • Intrusion Detection in Industrial Internet of Things Network‐Based on Deep Learning Model with Rule‐Based Feature Selection
    JB Awotunde, C Chakraborty, AE Adeniyi
    Wireless communications and mobile computing 2021 (1), 7154587 2021
    Citations: 155

  • Predictive modelling of COVID-19 confirmed cases in Nigeria
    RO Ogundokun, AF Lukman, GBM Kibria, JB Awotunde, BB Aladeitan
    Infectious Disease Modelling 5, 543-548 2020
    Citations: 132

  • Privacy and security concerns in IoT-based healthcare systems
    JB Awotunde, RG Jimoh, SO Folorunso, EA Adeniyi, KM Abiodun, ...
    The fusion of internet of things, artificial intelligence, and cloud 2021
    Citations: 131

  • IoMT-based wearable body sensors network healthcare monitoring system
    EA Adeniyi, RO Ogundokun, JB Awotunde
    IoT in healthcare and ambient assisted living, 103-121 2021
    Citations: 105

  • Disease diagnosis system for IoT-based wearable body sensors with machine learning algorithm
    JB Awotunde, SO Folorunso, AK Bhoi, PO Adebayo, MF Ijaz
    Hybrid artificial intelligence and IoT in healthcare, 201-222 2021
    Citations: 85

  • Application of big data with fintech in financial services
    JB Awotunde, EA Adeniyi, RO Ogundokun, FE Ayo
    Fintech with artificial intelligence, big data, and blockchain, 107-132 2021
    Citations: 81

  • Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection
    FE Ayo, SO Folorunso, AA Abayomi-Alli, AO Adekunle, JB Awotunde
    Information Security Journal: A Global Perspective 29 (6), 267-283 2020
    Citations: 79

  • Medical diagnosis system using fuzzy logic
    JB Awotunde, OE Matiluko, OW Fatai
    African Journal of Computing & ICT 7 (2), 99-106 2014
    Citations: 78

  • An enhanced intrusion detection system using particle swarm optimization feature extraction technique
    RO Ogundokun, JB Awotunde, P Sadiku, EA Adeniyi, M Abiodun, ...
    Procedia Computer Science 193, 504-512 2021
    Citations: 69

  • IoT-based wearable body sensor network for COVID-19 pandemic
    JB Awotunde, RG Jimoh, M AbdulRaheem, ID Oladipo, SO Folorunso, ...
    Advances in Data Science and Intelligent Data Communication Technologies for 2021
    Citations: 58

  • Machine learning algorithm for cryptocurrencies price prediction
    JB Awotunde, RO Ogundokun, RG Jimoh, S Misra, TO Aro
    Artificial intelligence for cyber security: methods, issues and possible 2021
    Citations: 56

  • A safe and secured iris template using steganography and cryptography
    OC Abikoye, UA Ojo, JB Awotunde, RO Ogundokun
    Multimedia Tools and Applications 79 (31), 23483-23506 2020
    Citations: 54

  • Cloud and IoMT-based big data analytics system during COVID-19 pandemic
    JB Awotunde, RO Ogundokun, S Misra
    Efficient Data Handling for Massive Internet of Medical Things: Healthcare 2021
    Citations: 51

  • An ensemble tree-based model for intrusion detection in industrial internet of things networks
    JB Awotunde, SO Folorunso, AL Imoize, JO Odunuga, CC Lee, CT Li, ...
    Applied Sciences 13 (4), 2479 2023
    Citations: 49

  • Feature extraction and artificial intelligence-based intrusion detection model for a secure internet of things networks
    JB Awotunde, S Misra
    Illumination of artificial intelligence in cybersecurity and forensics, 21-44 2022
    Citations: 49

  • A deep learning-based intrusion detection technique for a secured IoMT system
    JB Awotunde, KM Abiodun, EA Adeniyi, SO Folorunso, RG Jimoh
    International Conference on Informatics and Intelligent Applications, 50-62 2021
    Citations: 48

  • Big data analytics of iot-based cloud system framework: Smart healthcare monitoring systems
    JB Awotunde, RG Jimoh, RO Ogundokun, S Misra, OC Abikoye
    Artificial intelligence for cloud and edge computing, 181-208 2022
    Citations: 46

  • A decision support system for multi-target disease diagnosis: A bioinformatics approach
    FE Ayo, JB Awotunde, RO Ogundokun, SO Folorunso, AO Adekunle
    Heliyon 6 (3) 2020
    Citations: 46

  • Machine learning prediction for covid 19 pandemic in india
    RO Ogundokun, JB Awotunde
    medRxiv, 2020.05. 20.20107847 2020
    Citations: 43

  • Internet of medical things (IoMT): applications, challenges, and prospects in a data-driven technology
    SA Ajagbe, JB Awotunde, AO Adesina, P Achimugu, TA Kumar
    Intelligent Healthcare: Infrastructure, Algorithms and Management, 299-319 2022
    Citations: 42