Intrusion Detection Framework for Internet of Things with Rule Induction for Model Explanation Kayode S. Adewole, Andreas Jacobsson, and Paul Davidsson MDPI AG As the proliferation of Internet of Things (IoT) devices grows, challenges in security, privacy, and interoperability become increasingly significant. IoT devices often have resource constraints, such as limited computational power, energy efficiency, bandwidth, and storage, making it difficult to implement advanced security measures. Additionally, the diversity of IoT devices creates vulnerabilities and threats that attackers can exploit, including spoofing, routing, man-in-the-middle, and denial-of-service. To address these evolving threats, Intrusion Detection Systems (IDSs) have become a vital solution. IDS actively monitors network traffic, analyzing incoming and outgoing data to detect potential security breaches, ensuring IoT systems remain safeguarded against malicious activity. This study introduces an IDS framework that integrates ensemble learning with rule induction for enhanced model explainability. We study the performance of five ensemble algorithms (Random Forest, AdaBoost, XGBoost, LightGBM, and CatBoost) for developing effective IDS for IoT. The results show that XGBoost outperformed the other ensemble algorithms on two publicly available datasets for intrusion detection. XGBoost achieved 99.91% accuracy and 99.88% AUC-ROC on the CIC-IDS2017 dataset, as well as 98.54% accuracy and 93.06% AUC-ROC on the CICIoT2023 dataset, respectively. We integrate model explainability to provide transparent IDS system using a rule induction method. The experimental results confirm the efficacy of the proposed approach for providing a lightweight, transparent, and trustworthy IDS system that supports security analysts, end-users, and different stakeholders when making decisions regarding intrusion and non-intrusion events.
Advances in the Design of Renewable Energy Power Supply for Rural Health Clinics, Case Studies, and Future Directions Abubakar Abdulkarim, Nasir Faruk, Emmanuel Alozie, Hawau Olagunju, Ruqayyah Yusuf Aliyu, Agbotiname Lucky Imoize, Kayode S. Adewole, Yusuf Olayinka Imam-Fulani, Salisu Garba, Bashir Abdullahi Baba,et al. MDPI AG Globally, effective and efficient healthcare is critical to the wellbeing and standard of living of any society. Unfortunately, several distant communities far from the national grid do not have access to reliable power supply, owing to economic, environmental, and technical challenges. Furthermore, unreliable, unavailable, and uneconomical power supply to these communities contributes significantly to the delivery of substandard or absence of qualitative healthcare services, resulting in higher mortality rates and associated difficulty in attracting qualified healthcare workers to the affected communities. Given these circumstances, this paper aims to conduct a comprehensive review of the status of renewable energy available to rural healthcare clinics around the globe, emphasizing its potential, analysis, procedures, modeling techniques, and case studies. In this light, several renewable energy modeling techniques were reviewed to examine the optimum power supply to the referenced healthcare centers in remote communities. To this end, analytical techniques and standard indices for reliable power supply to the isolated healthcare centers are suggested. Specifically, different battery storage systems that are suitable for rural healthcare systems are examined, and the most economical and realistic procedure for the maintenance of microgrid power systems for sustainable healthcare delivery is defined. Finally, this paper will serve as a valuable resource for policymakers, researchers, and experts in rural power supply to remote healthcare centers globally.
Privacy-aware Hydra (PA-Hydra) for 3D Scene Graph Construction Erdal Akin, Kayode S. Adewole, Héctor Caltenco, Reza Malekian, and Jan A. Persson IEEE A 3D Scene Graph (3DSG) is a hierarchical 3D representation of a physical environment. Hydra is a promising real-time spatial perception framework for 3DSG developed by MIT Spark Lab. It uses sensor and camera data from an agent to construct a graph of the environment with five layers and continuously updates it. Albeit its utility and efficiency in generating and updating real-time 3DSG using visual-inertial sensors, Hydra and many other 3DSG frameworks ignore violating to identify private sensitive objects by segmenting, identifying, and reconstructing everything in data. Therefore, in this paper, we enhance Hydra to preserve sensitive data and increase the privacy-awareness of the framework. Accordingly, we propose a Privacy-aware Hydra (Pa-Hydra) framework, which integrates a state-of-the-art Object Detection (OD) algorithm that utilizes a proposed Filter Algorithm to cover sensitive objects with black boxes and prevent them from being constructed by Hydra. We implemented the framework with two popular OD algorithms with two different pre-trained models: You Only Look Once version 9 (YOLOv9) and Real-time Detection Transformer (RTDETR). We evaluated the algorithms using the COCO2017 validation dataset and observed the efficiency of the proposed framework on the uHuman2 (uH2) dataset.
ARAM: Assets-based Risk Assessment Model for Connected Smart Homes Kayode S. Adewole, Andreas Jacobsson, and Paul Davidsson IEEE Connected smart homes (CSH) have benefited immensely from emerging Internet of Things (IoT) technology. CSH is intended to support everyday life in the private seclusion of the home, and typically covers the integration of smart devices such as smart meters, heating, ventilation, and air conditioning (HVAC), intelligent lightening, and voice-activated assistants among others. Nevertheless, the risks associated with CSH assets are often of high concern. For instance, energy consumption monitoring through smart meters can reveal sensitive information that may pose a privacy risk to home occupants if not properly managed. Existing risk assessment approaches for CSH tend to focus on qualitative risk assessment methodologies, such as operationally critical threat, asset, and vulnerability evaluation (OCTAVE). However, security risk assessment, particularly for IoT environments, demands both qualitative and quantitative risk assessment. This paper proposes assets-based risk assessment model that integrates both qualitative and quantitative risk assessment to determine the risk related to assets in CSH when a specific service is used. We apply fuzzy Analytic Hierarchy Process (fuzzy AHP) to address the subjective assessment of the IoT risk analysts and stakeholders. The applicability of the proposed model is illustrated through a use case that constitutes a scenario connected to service delivery in CSH. The proposed model provides a guideline to researchers and practitioners on how to quantify the risks targeting assets in CSH.
LPM: A Lightweight Privacy-Aware Model for IoT Data Fusion in Smart Connected Homes Kayode S. Adewole and Andreas Jacobsson IEEE Internet of Things (IoT) technology has created a new dimension for data collection, transmission, processing, storage, and service delivery. With the advantages offered by IoT technologies, interest in smart home automation has increased over the years. Nevertheless, smart connected homes are characterized with the security and privacy problems that are associated with aggregating multiple sensors' data and exposing them to the Internet. In this paper, we propose LPM, a lightweight privacy-aware model that leverages information theoretic correlation analysis and gradient boosting to fuse multiple sensors' data at the edge nodes of smart connected homes. LPM employs federated learning, edge and cloud computing to reduce privacy leakages of sensitive data. To demonstrate its applicability, two services, commonly provided by smart homes, i.e., occupancy detection and people count estimation, were experimentally investigated. The results show that LPM can achieve accuracy, F1 score and AUC-ROC of 99.98%, 99.13%, and 99.98% respectively for occupancy detection as well as Mean Squared Error (MSE), Mean Absolute Error (MAE), and $R^{2}$ of 0.0011,0.0175, and 98.39% respectively for people count estimation. LPM offers the opportunity to each smart connected home to participate in collaborative learning that is achieved through the federated machine learning component of the proposed model.
Segment Anything Model (SAM) Meets Object Detected Box Prompts Erdal Akin, Héctor Caltenco, Kayode S. Adewole, Reza Malekian, and Jan A. Persson IEEE Segmenting images is an intricate and exceptionally demanding field within computer vision. Instance Segmentation is one of the subfields of image segmentation that segments objects on a given image or video. It categorizes the class labels according to individual instances, ensuring that distinct instance markers are assigned to each occurrence of the same object class, even if multiple instances exist. With the development of computer systems, segmentation studies have increased very rapidly. One of the state-of-the-art algorithms recently published by Meta AI, which segments everything on a given image, is called the Segment Anything Model (SAM). Its impressive zero-shot performance encourages us to use it for diverse tasks. Therefore, we would like to leverage the SAM for an effective instance segmentation model. Accordingly, in this paper, we propose a hybrid instance segmentation method in which Object Detection algorithms extract bounding boxes of detected objects and load SAM to produce segmentation, called Box Prompted SAM (BP-SAM). Experimental evaluation of the COCO2017 Validation dataset provided us with promising performance.
5G Frequency Standardization, Technologies, Channel Models, and Network Deployment: Advances, Challenges, and Future Directions Yusuf Olayinka Imam-Fulani, Nasir Faruk, Olugbenga A. Sowande, Abubakar Abdulkarim, Emmanuel Alozie, Aliyu D. Usman, Kayode S. Adewole, Abdulkarim A. Oloyede, Haruna Chiroma, Salisu Garba,et al. MDPI AG The rapid increase in data traffic caused by the proliferation of smart devices has spurred the demand for extremely large-capacity wireless networks. Thus, faster data transmission rates and greater spectral efficiency have become critical requirements in modern-day networks. The ubiquitous 5G is an end-to-end network capable of accommodating billions of linked devices and offering high-performance broadcast services due to its several enabling technologies. However, the existing review works on 5G wireless systems examined only a subset of these enabling technologies by providing a limited coverage of the system model, performance analysis, technology advancements, and critical design issues, thus requiring further research directions. In order to fill this gap and fully grasp the potential of 5G, this study comprehensively examines various aspects of 5G technology. Specifically, a systematic and all-encompassing evaluation of the candidate 5G enabling technologies was conducted. The evolution of 5G, the progression of wireless mobile networks, potential use cases, channel models, applications, frequency standardization, key research issues, and prospects are discussed extensively. Key findings from the elaborate review reveal that these enabling technologies are critical to developing robust, flexible, dependable, and scalable 5G and future wireless communication systems. Overall, this review is useful as a resource for wireless communication researchers and specialists.
Modeling and Simulation of Total Attenuation of P2P NLOS 5G and Beyond Wireless Communication Systems Operating in FR2 Bands in Nigeria Emmanuel Alozie, Nasir Faruk, Abubakar Abdulkarim, Aliyu D. Usman, Yusuf Olayinka Imam-Fulani, Salisu Garba, Kayode S. Adewole, Abdulkarim A. Oloyede, Olugbenga A. Sowande, Bashir Abdullahi Baba,et al. IEEE Signal propagation in a particular region differs from another due to differences in atmospheric, climatic and environmental properties, distinct terrain and clutter features. Adequate analysis is essential to understand the radio propagation behavior in a particular region. The ITU-R designated four rain regions, M, N, P, and Q, for Nigeria representing the rain rate distribution and also provided further classifications based on ground conductivity, among other salient parameters. Based on these classifications, this paper utilized the EDX Signal Pro software® to model and simulate a typical Point-to-Point (P2P), Non-Line of Sight (NLOS) link scenarios for 5G networks. The objective was to estimate and compare the total loss, excess loss, and flat fade margins for each rain region in Nigeria. Results obtained from the comparison showed that signals propagating in region N experience the highest level of losses and fading, while, region Q has the least losses and fading.
Signal Attenuation Modeling and Simulation for 5G and Beyond P2P Wireless Communication Networks in FR2 Bands: Comparison within M-Region in Nigeria Emmanuel Alozie, Nasir Faruk, Abubakar Abdulkarim, Aliyu D. Usman, Yusuf Olayinka Imam-Fulani, Salisu Garba, Kayode S. Adewole, Abdulkarim A. Oloyede, Olugbenga A. Sowande, Bashir Abdullahi Baba,et al. IEEE ITU-R categorized Nigeria into four rain regions (i.e., M, N, P, and Q) depending on the atmospheric conditions. Previous works that have conducted rain and attenuation modeling and simulations have assumed similar signal propagation behavior and parameters within locations categorized under the same region. This paper aims to explore these assumptions by conducting an extensive radio propagation simulations of point-to-point microwave links with a clear line-of-sight in order to estimate the total path loss (attenuation), excess path loss, and flat fade margins for each of the locations within the M-regions, i.e., Kano, Sokoto, and Adamawa. Results obtained showed that in all the locations, the loss monotonically increases with distance, with Sokoto having the highest level of signal losses and fading, while, Adamawa has the lowest. The deviation for both total loss, excess loss, and flat fading margin was found to be between 15 dB across the region.
Investigation of the Impact of Height and Bandwidth on Path Loss Exponent of 5G FR1 Wireless Networks at 800, 3500, and 5900 MHz Yusuf Olayinka Imam-Fulani, Nasir Faruk, Aliyu D. Usman, Abubakar Abdulkarim, Abdoulie M.S Tekanyi, Abdulmalik S. Yaro, Emmanuel Alozie, Salisu Garba, Kayode S. Adewole, Abdulkarim A. Oloyede,et al. IEEE 5G communication systems provide an end-to-end wireless connection to billions of users and devices across the globe. The quality of signals received during radio communication is notably influenced by the behavior of the radio propagation channel. A major parameter used in characterizing this channel is the Path Loss Exponent (PLE). Several works that have estimated and analyzed the PLE mostly considered the effect of distance and carrier frequency. However, the effect of base station antenna height and channel bandwidth on the PLE for 5G networks have not been adequately considered. To address this, the impact of antenna height of base station and channel bandwidth on the PLE within the 5G Frequency Range 1 (FR1) frequencies was investigated in this study, specifically at 800, 3500, and 5900 MHz. The licensed EDX Signal Pro software® with Cirrus high resolution global terrain and clutter data base was utilized to model, simulate and analyze the PLE for Kano City, Nigeria. Results showed that for the tested frequencies, an increase in either base station height or channel bandwidth leads to a significant reduction in the PLE. This study can be utilized by network planning engineers and the wireless research community to further improve network implementation and optimization toward understanding the behavior of signal propagation in 5G networks and beyond.
Terrestrial Radio Propagation Research Datasets Repository Kayode S. Adewole, Hawau Olagunju, Nasir Faruk, Agbotiname Lucky Imoize, Emmanuel Alozie, Olugbenga A. Sowande, Abubakar Abdulkarim, Aliyu D. Usman, Yusuf Olayinka Imam-Fulani, Abdulkarim A. Oloyede,et al. IEEE Terrestrial Radio Propagation (TRP) involves radio wave propagation from one station to another over the surface of the earth. Radio communication systems have been deployed for broadcasting, mobile cellular, and public safety. Radio propagation planning plays a crucial role in designing and deploying terrestrial radio networks. Radio propagation models (Path loss Models) are utilized during the link budget, coverage, and interference estimations. The models guide radio network engineers in choosing appropriate placements of radio network equipment, such as the base stations. However, the high cost attributed to TRP data collection, lack of open access, and accurate TRP datasets hinders the development of path loss models that can reliably predict outcomes for different use cases. To address this problem, this paper aims to present a robust TRP repository that provides a platform for hosting and disseminating TRP datasets, which the research community could use for path loss modeling. The repository was implemented using the latest technologies, and its performance was evaluated. The system has been deployed for public access.
Privacy Protection of Synthetic Smart Grid Data Simulated via Generative Adversarial Networks Kayode Adewole and Vicenç Torra SCITEPRESS - Science and Technology Publications : The development in smart meter technology has made grid operations more efficient based on fine-grained electricity usage data generated at different levels of time granularity. Consequently, machine learning algorithms have benefited from these data to produce useful models for important grid operations. Although machine learning algorithms need historical data to improve predictive performance, these data are not readily available for public utilization due to privacy issues. The existing smart grid data simulation frameworks generate grid data with implicit privacy concerns since the data are simulated from a few real energy consumptions that are publicly available. This paper addresses two issues in smart grid. First, it assesses the level of privacy violation with the individual household appliances based on synthetic household aggregate loads consumption. Second, based on the findings, it proposes two privacy-preserving mechanisms to reduce this risk. Three inference attacks are simulated and the results obtained confirm the efficacy of the proposed privacy-preserving mechanisms.
Expert System and Decision Support System for Electrocardiogram Interpretation and Diagnosis: Review, Challenges and Research Directions Kayode S. Adewole, Hammed A. Mojeed, James A. Ogunmodede, Lubna A. Gabralla, Nasir Faruk, Abubakar Abdulkarim, Emmanuel Ifada, Yusuf Y. Folawiyo, Abdukareem A. Oloyede, Lukman A. Olawoyin,et al. MDPI AG Electrocardiography (ECG) is one of the most widely used recordings in clinical medicine. ECG deals with the recording of electrical activity that is generated by the heart through the surface of the body. The electrical activity generated by the heart is measured using electrodes that are attached to the body surface. The use of ECG in the diagnosis and management of cardiovascular disease (CVD) has been in existence for over a decade, and research in this domain has recently attracted large attention. Along this line, an expert system (ES) and decision support system (DSS) have been developed for ECG interpretation and diagnosis. However, despite the availability of a lot of literature, access to recent and more comprehensive review papers on this subject is still a challenge. This paper presents a comprehensive review of the application of ES and DSS for ECG interpretation and diagnosis. Researchers have proposed a number of features and methods for ES and DSS development that can be used to monitor a patient’s health condition through ECG recordings. In this paper, a taxonomy of the features and methods for ECG interpretation and diagnosis were presented. The significance of the features and methods, as well as their limitations, were analyzed. This review further presents interesting theoretical concepts in this domain, as well as identifies challenges and open research issues on ES and DSS development for ECG interpretation and diagnosis that require substantial research effort. In conclusion, this paper identifies important future research areas with the purpose of advancing the development of ES and DSS for ECG interpretation and diagnosis.
DFTMicroagg: a dual-level anonymization algorithm for smart grid data Kayode S. Adewole and Vicenç Torra Springer Science and Business Media LLC AbstractThe introduction of advanced metering infrastructure (AMI) smart meters has given rise to fine-grained electricity usage data at different levels of time granularity. AMI collects high-frequency daily energy consumption data that enables utility companies and data aggregators to perform a rich set of grid operations such as demand response, grid monitoring, load forecasting and many more. However, the privacy concerns associated with daily energy consumption data has been raised. Existing studies on data anonymization for smart grid data focused on the direct application of perturbation algorithms, such as microaggregation, to protect the privacy of consumers. In this paper, we empirically show that reliance on microaggregation alone is not sufficient to protect smart grid data. Therefore, we propose DFTMicroagg algorithm that provides a dual level of perturbation to improve privacy. The algorithm leverages the benefits of discrete Fourier transform (DFT) and microaggregation to provide additional layer of protection. We evaluated our algorithm on two publicly available smart grid datasets with millions of smart meters readings. Experimental results based on clustering analysis using k-Means, classification via k-nearest neighbor (kNN) algorithm and mean hourly energy consumption forecast using Seasonal Auto-Regressive Integrated Moving Average with eXogenous (SARIMAX) factors model further proved the applicability of the proposed method. Our approach provides utility companies with more flexibility to control the level of protection for their published energy data.
Empirical Analysis of Data Streaming and Batch Learning Models for Network Intrusion Detection Kayode S. Adewole, Taofeekat T. Salau-Ibrahim, Agbotiname Lucky Imoize, Idowu Dauda Oladipo, Muyideen AbdulRaheem, Joseph Bamidele Awotunde, Abdullateef O. Balogun, Rafiu Mope Isiaka, and Taye Oladele Aro MDPI AG Network intrusion, such as denial of service, probing attacks, and phishing, comprises some of the complex threats that have put the online community at risk. The increase in the number of these attacks has given rise to a serious interest in the research community to curb the menace. One of the research efforts is to have an intrusion detection mechanism in place. Batch learning and data streaming are approaches used for processing the huge amount of data required for proper intrusion detection. Batch learning, despite its advantages, has been faulted for poor scalability due to the constant re-training of new training instances. Hence, this paper seeks to conduct a comparative study using selected batch learning and data streaming algorithms. The batch learning and data streaming algorithms considered are J48, projective adaptive resonance theory (PART), Hoeffding tree (HT) and OzaBagAdwin (OBA). Furthermore, binary and multiclass classification problems are considered for the tested algorithms. Experimental results show that data streaming algorithms achieved considerably higher performance in binary classification problems when compared with batch learning algorithms. Specifically, binary classification produced J48 (94.73), PART (92.83), HT (98.38), and OBA (99.67), and multiclass classification produced J48 (87.66), PART (87.05), HT (71.98), OBA (82.80) based on accuracy. Hence, the use of data streaming algorithms to solve the scalability issue and allow real-time detection of network intrusion is highly recommended.
A Review on Rain Signal Attenuation Modeling, Analysis and Validation Techniques: Advances, Challenges and Future Direction Emmanuel Alozie, Abubakar Abdulkarim, Ibrahim Abdullahi, Aliyu D. Usman, Nasir Faruk, Imam-Fulani Yusuf Olayinka, Kayode S. Adewole, Abdulkarim A. Oloyede, Haruna Chiroma, Olugbenga A. Sowande,et al. MDPI AG Radio waves are attenuated by atmospheric phenomena such as snow, rain, dust, clouds, and ice, which absorb radio signals. Signal attenuation becomes more severe at extremely high frequencies, usually above 10 GHz. In typical equatorial and tropical locations, rain attenuation is more prevalent. Some established research works have attempted to provide state-of-the-art reviews on modeling and analysis of rain attenuation in the context of extremely high frequencies. However, the existing review works conducted over three decades (1990 to 2022), have not adequately provided comprehensive taxonomies for each method of rain attenuation modeling to expose the trends and possible future research directions. Also, taxonomies of the methods of model validation and regional developmental efforts on rain attenuation modeling have not been explicitly highlighted in the literature. To address these gaps, this paper conducted an extensive literature survey on rain attenuation modeling, methods of analyses, and model validation techniques, leveraging the ITU-R regional categorizations. Specifically, taxonomies in different rain attenuation modeling and analysis areas are extensively discussed. Key findings from the detailed survey have shown that many open research questions, challenges, and applications could open up new research frontiers, leading to novel findings in rain attenuation. Finally, this study is expected to be reference material for the design and analysis of rain attenuation.
Application of Machine Learning Algorithms to Path Loss Modeling: A Review Abubakar Abdulkarim, Nasir Faruk, Emmanuel Alozie, Olugbenga. A. Sowande, Imam-Fulani Yusuf Olayinka, Aliyu D. Usman, Kayode S. Adewole, Abdulkarim A. Oloyede, Haruna Chiroma, Salisu Garba,et al. IEEE The demand for high-speed internet services is increasing due to emerging needs such as e-commerce, e-health, education, and other high-technology applications. Wireless communication networks have now become a necessity, especially with the introduction of the 5G networks which have the potential to provide extraordinary data rates with extremely low latency. The deployment and operation of 5G and beyond networks in built-up environments would require a complex and reliable radio propagation model that guides network engineers to achieve effective coverage estimation and appropriate base station placements. The inefficiency, and sometimes inconsistencies of deterministic and empirical path loss models necessitated the need to integrate machine learning models. Recently, different machine learning-based pathloss models have been developed to overcome drawbacks associated with conventional pathloss models due to their significant learning and prediction abilities. This paper aims to review path loss models relative to machine learning-based algorithms with a focus on models developed in the last 21 years (2000 to 2021) to study their network parameters and architectures, designs, and applicability, and proffer further research directions.
Privacy-aware Hydra (PA-Hydra) for 3D Scene Graph Construction E Akin, KS Adewole, H Caltenco, R Malekian, JA Persson 2024 IEEE 10th World Forum on Internet of Things (WF-IoT), 822-827 2024
ARAM: Assets-based Risk Assessment Model for Connected Smart Homes KS Adewole, A Jacobsson, P Davidsson 2024 11th International Conference on Future Internet of Things and Cloud 2024
Advances in the Design of Renewable Energy Power Supply for Rural Health Clinics, Case Studies, and Future Directions A Abdulkarim, N Faruk, E Alozie, H Olagunju, RY Aliyu, AL Imoize, ... Clean Technologies 6 (3), 921-953 2024
A systematic review and meta-data analysis of clinical data repositories in Africa and beyond: recent development, challenges, and future directions KS Adewole, E Alozie, H Olagunju, N Faruk, RY Aliyu, AL Imoize, ... Discover Data 2 (1), 8 2024
LPM: A Lightweight Privacy-Aware Model for Data Fusion in Smart Connected Homes KS Adewole, A Jacobsson 2024 9th International Conference on Smart and Sustainable Technologies 2024
Segment Anything Model (SAM) Meets Object Detected Box Prompts E Akin, H Caltenco, KS Adewole, R Malekian, JA Persson 2024 IEEE International Conference on Industrial Technology (ICIT), 1-7 2024
Energy disaggregation risk resilience through microaggregation and discrete Fourier transform KS Adewole, V Torra Information Sciences 662, 120211 2024
HOMEFUS: A Privacy and Security-Aware Model for IoT Data Fusion in Smart Connected Homes KS Adewole, A Jacobsson 2024
Modeling and Simulation of Total Attenuation of P2P NLOS 5G and Beyond Wireless Communication Systems Operating in FR2 Bands in Nigeria E Alozie, N Faruk, A Abdulkarim, AD Usman, YO Imam-Fulani, S Garba, ... 2023 2nd International Conference on Multidisciplinary Engineering and 2023
Investigation of the Impact of Height and Bandwidth on Path Loss Exponent of 5G FR1 Wireless Networks at 800, 3500, and 5900 MHz YO Imam-Fulani, N Faruk, AD Usman, A Abdulkarim, AMS Tekanyi, ... 2023 2nd International Conference on Multidisciplinary Engineering and 2023
Terrestrial radio propagation research datasets repository KS Adewole, H Olagunju, N Faruk, AL Imoize, E Alozie, OA Sowande, ... 2023 2nd International Conference on Multidisciplinary Engineering and 2023
Signal Attenuation Modeling and Simulation for 5G and Beyond P2P Wireless Communication Networks in FR2 Bands: Comparison within M-Region in Nigeria E Alozie, N Faruk, A Abdulkarim, AD Usman, YO Imam-Fulani, S Garba, ... 2023 2nd International Conference on Multidisciplinary Engineering and 2023
A review of dust-induced electromagnetic waves scattering theories and models for 5G and beyond wireless communication systems E Alozie, A Musa, N Faruk, AL Imoize, A Abdulkarim, AD Usman, ... Scientific African 21, e01816 2023
A systematic review and Meta-data analysis on the applications of Deep Learning in Electrocardiogram N Musa, AY Gital, N Aljojo, H Chiroma, KS Adewole, HA Mojeed, N Faruk, ... Journal of ambient intelligence and humanized computing 14 (7), 9677-9750 2023
Border Control via Passport Verification using Fingerprint Authentication Technique OT Omolewa, EJ Adeioke, OO Titilope, AK Sakarivan, AJ Kehinde 2023 International Conference on Science, Engineering and Business for 2023
5G frequency standardization, technologies, channel models, and network deployment: Advances, challenges, and future directions YO Imam-Fulani, N Faruk, OA Sowande, A Abdulkarim, E Alozie, ... Sustainability 15 (6), 5173 2023
Large scale survey for radio propagation in developing machine learning model for path losses in communication systems H Chiroma, P Nickolas, N Faruk, E Alozie, IFY Olayinka, KS Adewole, ... Scientific African 19, e01550 2023
Privacy Protection of Synthetic Smart Grid Data Simulated via Generative Adversarial Networks KS Adewole, V Torra 20th International Conference on Security and Cryptography (SECRYPT), JUL 10 2023
A Study of Impacts of Artificial Intelligence on COVID-19 Prediction, Diagnosis, Treatment, and Prognosis RM Isiaka, RS Babatunde, JF Ajao, SR Yusuff, DD Popoola, MO Arowolo, ... Journal, Advances in Mathematical & Computational Sciences 10 (4) 2022
Expert system and decision support system for electrocardiogram interpretation and diagnosis: review, challenges and research directions KS Adewole, HA Mojeed, JA Ogunmodede, LA Gabralla, N Faruk, ... Applied Sciences 12 (23), 12342 2022
MOST CITED SCHOLAR PUBLICATIONS
The role of big data in smart city IAT Hashem, V Chang, NB Anuar, K Adewole, I Yaqoob, A Gani, E Ahmed, ... International Journal of information management 36 (5), 748-758 2016 Citations: 1465
Malicious accounts: Dark of the social networks KS Adewole, NB Anuar, A Kamsin, KD Varathan, SA Razak Journal of Network and Computer Applications 79, 41-67 2017 Citations: 211
Twitter spam account detection based on clustering and classification methods KS Adewole, T Han, W Wu, H Song, AK Sangaiah The Journal of Supercomputing 76, 4802-4837 2020 Citations: 104
Stock trend prediction using regression analysis–a data mining approach SO Abdulsalam, KS Adewole, RG Jimoh ARPN Journal of Systems and Software 2011 Citations: 96
Microarray cancer feature selection: Review, challenges and research directions MA Hambali, TO Oladele, KS Adewole International Journal of Cognitive Computing in Engineering 1, 78-97 2020 Citations: 88
5G frequency standardization, technologies, channel models, and network deployment: Advances, challenges, and future directions YO Imam-Fulani, N Faruk, OA Sowande, A Abdulkarim, E Alozie, ... Sustainability 15 (6), 5173 2023 Citations: 77
A comprehensive survey on low-cost ECG acquisition systems: Advances on design specifications, challenges and future direction N Faruk, A Abdulkarim, I Emmanuel, YY Folawiyo, KS Adewole, ... biocybernetics and biomedical engineering 41 (2), 474-502 2021 Citations: 76
Efficient data hiding system using cryptography and steganography C Abikoye Oluwakemi, S Adewole Kayode, J Oladipupo Ayotunde International Journal of Applied Information Systems IJAIS411 pp. 6 11 2012 Citations: 70
SMSAD: a framework for spam message and spam account detection KS Adewole, NB Anuar, A Kamsin, AK Sangaiah Multimedia Tools and Applications 78, 3925-3960 2019 Citations: 59
A systematic review and Meta-data analysis on the applications of Deep Learning in Electrocardiogram N Musa, AY Gital, N Aljojo, H Chiroma, KS Adewole, HA Mojeed, N Faruk, ... Journal of ambient intelligence and humanized computing 14 (7), 9677-9750 2023 Citations: 54
A review on rain signal attenuation modeling, analysis and validation techniques: Advances, challenges and future direction E Alozie, A Abdulkarim, I Abdullahi, AD Usman, N Faruk, IFY Olayinka, ... Sustainability 14 (18), 11744 2022 Citations: 51
STUDENTS’ACADEMIC PERFORMANCE AND DROPOUT PREDICTION AO Ameen, MA Alarape, KS Adewole Malaysian Journal of Computing 4 (2), 278-303 2019 Citations: 50
Ensemble-based logistic model trees for website phishing detection VE Adeyemo, AO Balogun, HA Mojeed, NO Akande, KS Adewole Advances in Cyber Security: Second International Conference, ACeS 2020 2021 Citations: 46
Development of fingerprint biometric attendance system for non-academic staff in a tertiary institution KS Adewole, SO Abdulsalam, RS Babatunde, TM Shittu, MO Oloyede Development 5 (2), 62-70 2014 Citations: 46
Fingerprint biometric authentication for enhancing staff attendance system O Oloyede Muhtahir, O Adedoyin Adeyinka, S Adewole Kayode system 5 (3) 2013 Citations: 46
Improving the phishing website detection using empirical analysis of Function Tree and its variants AO Balogun, KS Adewole, MO Raheem, ON Akande, FE Usman-Hamza, ... Heliyon 7 (7) 2021 Citations: 37
Multi-objective scheduling of MapReduce jobs in big data processing IAT Hashem, NB Anuar, M Marjani, A Gani, AK Sangaiah, AK Sakariyah Multimedia Tools and Applications 77, 9979-9994 2018 Citations: 36
Large scale survey for radio propagation in developing machine learning model for path losses in communication systems H Chiroma, P Nickolas, N Faruk, E Alozie, IFY Olayinka, KS Adewole, ... Scientific African 19, e01550 2023 Citations: 33
Hybrid rule-based model for phishing URLs detection KS Adewole, AG Akintola, SA Salihu, N Faruk, RG Jimoh Emerging Technologies in Computing: Second International Conference, iCETiC 2019 Citations: 30
Data Mining in Market Basket Transaction: An Association Rule Mining Approach SO Abdulsalam, KS Adewole, AG Akintola, MA Hambali International Journal of Applied Information Systems (IJAIS) 7 (10), 15-20 2014 Citations: 28