CINXE.COM
Prof. Ifeanyi S Nwokoro | Rhema University, Aba Nigeria - Academia.edu
<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Prof. Ifeanyi S Nwokoro | Rhema University, Aba Nigeria - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "profiles/works", 'action': "summary", 'controller_action': 'profiles/works#summary', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="IfoH2sRnWWH2K3G3rxHncrr2d4fwXqvz9EaHnkmQObSglmXiQ6ykKKGs149Q-YAivIHpz7eWjdTDC7PBnVHx3Q" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/wow-3d36c19b4875b226bfed0fcba1dcea3f2fe61148383d97c0465c016b8c969290.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/social/home-79e78ce59bef0a338eb6540ec3d93b4a7952115b56c57f1760943128f4544d42.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/heading-95367dc03b794f6737f30123738a886cf53b7a65cdef98a922a98591d60063e3.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-bfbac2a470372e2f3a6661a65fa7ff0a0fbf7aa32534d9a831d683d2a6f9e01b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/body-170d1319f0e354621e81ca17054bb147da2856ec0702fe440a99af314a6338c5.css" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&family=Gupter:wght@400;500;700&family=IBM+Plex+Mono:wght@300;400&family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-2b6f90dbd75f5941bc38f4ad716615f3ac449e7398313bb3bc225fba451cd9fa.css" /> <meta name="author" content="prof. ifeanyi s nwokoro" /> <meta name="description" content="I am a Senior Academic in a Nigerian University. I am a professional IT consultant." /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'works'; var $action_name = "summary"; var $rails_env = 'production'; var $app_rev = 'bbdb80613189ba697977787ab78246749f444764'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":14016,"monthly_visitors":"107 million","monthly_visitor_count":107440917,"monthly_visitor_count_in_millions":107,"user_count":283669998,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1740481881000); window.Aedu.timeDifference = new Date().getTime() - 1740481881000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link rel="preload" href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" as="style" onload="this.rel='stylesheet'"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-1eb081e01ca8bc0c1b1d866df79d9eb4dd2c484e4beecf76e79a7806c72fee08.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-0f3bf7f6f3517097948bf4ffb828d255bab326cd7f9daa1b0fac1bbd8d6b6df6.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-bb770f3e69f95986e63e7c7781a4a48d351e700cb7be914bb67d866ee608a254.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://rhemauniversity.academia.edu/IfeanyiNwokoro" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-profiles/works a-summary logged_out'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-profiles/works a-summary logged_out'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&c2=26766707&cv=2.0&cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to <a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more <span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i> We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/hc/en-us"><i class="fa fa-question-circle"></i> Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less <span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <script src="//a.academia-assets.com/assets/webpack_bundles/profile.wjs-bundle-cc15444cb79edeb8ffc95efe7d12e4ad4e4df656440f173bd09913cdd0643e0d.js" defer="defer"></script><script>$viewedUser = Aedu.User.set_viewed( {"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","photo":"https://0.academia-photos.com/116522139/67594065/149335494/s65_dr._ifeanyi.nwokoro.jpg","has_photo":true,"department":{"id":1273922,"name":"Computer Science","url":"https://rhemauniversity.academia.edu/Departments/Computer_Science/Documents","university":{"id":105373,"name":"Rhema University, Aba Nigeria","url":"https://rhemauniversity.academia.edu/"}},"position":"Department Member","position_id":4,"is_analytics_public":false,"interests":[{"id":102974,"name":"Lecturer","url":"https://www.academia.edu/Documents/in/Lecturer"},{"id":1163133,"name":"Higher Edcation","url":"https://www.academia.edu/Documents/in/Higher_Edcation"},{"id":61835,"name":"Urban Design","url":"https://www.academia.edu/Documents/in/Urban_Design"},{"id":4808,"name":"Urban Planning","url":"https://www.academia.edu/Documents/in/Urban_Planning"},{"id":724,"name":"Economics","url":"https://www.academia.edu/Documents/in/Economics"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":922,"name":"Education","url":"https://www.academia.edu/Documents/in/Education"},{"id":48,"name":"Engineering","url":"https://www.academia.edu/Documents/in/Engineering"},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology"}]} ); if ($a.is_logged_in() && $viewedUser.is_current_user()) { $('body').addClass('profile-viewed-by-owner'); } $socialProfiles = []</script><div id="js-react-on-rails-context" style="display:none" data-rails-context="{"inMailer":false,"i18nLocale":"en","i18nDefaultLocale":"en","href":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","location":"/IfeanyiNwokoro","scheme":"https","host":"rhemauniversity.academia.edu","port":null,"pathname":"/IfeanyiNwokoro","search":null,"httpAcceptLanguage":null,"serverSide":false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="ProfileCheckPaperUpdate" data-props="{}" data-trace="false" data-dom-id="ProfileCheckPaperUpdate-react-component-47ff3930-fa5e-413c-87bd-29700b5017da"></div> <div id="ProfileCheckPaperUpdate-react-component-47ff3930-fa5e-413c-87bd-29700b5017da"></div> <div class="DesignSystem"><div class="onsite-ping" id="onsite-ping"></div></div><div class="profile-user-info DesignSystem"><div class="social-profile-container"><div class="left-panel-container"><div class="user-info-component-wrapper"><div class="user-summary-cta-container"><div class="user-summary-container"><div class="social-profile-avatar-container"><img class="profile-avatar u-positionAbsolute" alt="Prof. Ifeanyi S Nwokoro" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/116522139/67594065/149335494/s200_dr._ifeanyi.nwokoro.jpg" /></div><div class="title-container"><h1 class="ds2-5-heading-sans-serif-sm">Prof. Ifeanyi S Nwokoro</h1><div class="affiliations-container fake-truncate js-profile-affiliations"><div><a class="u-tcGrayDarker" href="https://rhemauniversity.academia.edu/">Rhema University, Aba Nigeria</a>, <a class="u-tcGrayDarker" href="https://rhemauniversity.academia.edu/Departments/Computer_Science/Documents">Computer Science</a>, <span class="u-tcGrayDarker">Department Member</span></div><div><a class="u-tcGrayDarker" href="https://funai.academia.edu/">Federal University Ndufu Alike Ikwo</a>, <a class="u-tcGrayDarker" href="https://funai.academia.edu/Departments/Computer_Science/Documents">Computer Science</a>, <span class="u-tcGrayDarker">Alumnus</span></div></div></div></div><div class="sidebar-cta-container"><button class="ds2-5-button hidden profile-cta-button grow js-profile-follow-button" data-broccoli-component="user-info.follow-button" data-click-track="profile-user-info-follow-button" data-follow-user-fname="Prof. Ifeanyi" data-follow-user-id="116522139" data-follow-user-source="profile_button" data-has-google="false"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">add</span>Follow</button><button class="ds2-5-button hidden profile-cta-button grow js-profile-unfollow-button" data-broccoli-component="user-info.unfollow-button" data-click-track="profile-user-info-unfollow-button" data-unfollow-user-id="116522139"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">done</span>Following</button></div></div><div class="user-stats-container"><a><div class="stat-container js-profile-followers"><p class="label">Followers</p><p class="data">435</p></div></a><a><div class="stat-container js-profile-followees" data-broccoli-component="user-info.followees-count" data-click-track="profile-expand-user-info-following"><p class="label">Following</p><p class="data">1</p></div></a><a><div class="stat-container js-profile-coauthors" data-broccoli-component="user-info.coauthors-count" data-click-track="profile-expand-user-info-coauthors"><p class="label">Co-authors</p><p class="data">3</p></div></a><div class="js-mentions-count-container" style="display: none;"><a href="/IfeanyiNwokoro/mentions"><div class="stat-container"><p class="label">Mentions</p><p class="data"></p></div></a></div><span><div class="stat-container"><p class="label"><span class="js-profile-total-view-text">Public Views</span></p><p class="data"><span class="js-profile-view-count"></span></p></div></span></div><div class="user-bio-container"><div class="profile-bio fake-truncate js-profile-about" style="margin: 0px;">I am a Senior Academic in a Nigerian University. I am a professional IT consultant.<br /><b>Address: </b>Rhema University Nigeria<br /><div class="js-profile-less-about u-linkUnstyled u-tcGrayDarker u-textDecorationUnderline u-displayNone">less</div></div></div><div class="suggested-academics-container"><div class="suggested-academics--header"><p class="ds2-5-body-md-bold">Related Authors</p></div><ul class="suggested-user-card-list"><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://wwwo6u.academia.edu/%D9%90AhmedHanafi"><img class="profile-avatar u-positionAbsolute" alt="Ahmed M . Hanafi" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/49197095/23248029/22340224/s200_ahmed.hanafi.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://wwwo6u.academia.edu/%D9%90AhmedHanafi">Ahmed M . Hanafi</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">October 6 University</p></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://independent.academia.edu/KaturiRayudu"><img class="profile-avatar u-positionAbsolute" alt="Katuri Rayudu" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/11176971/9191370/10248800/s200_katuri.rayudu.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/KaturiRayudu">Katuri Rayudu</a></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://independent.academia.edu/sriharimandava"><img class="profile-avatar u-positionAbsolute" alt="srihari mandava" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/13748960/105388298/94587443/s200_srihari.mandava.png" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/sriharimandava">srihari mandava</a></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://aust.academia.edu/PrangonChowdhury"><img class="profile-avatar u-positionAbsolute" border="0" alt="" src="//a.academia-assets.com/images/s200_no_pic.png" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://aust.academia.edu/PrangonChowdhury">Prangon Chowdhury</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">Ahsanullah University of Science and Technology</p></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://independent.academia.edu/SEYYEDMortezaMuqeemi"><img class="profile-avatar u-positionAbsolute" alt="Seyed Morteza Moghimi" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/46667025/74865646/63368517/s200_seyyed_morteza.muqeemi.png" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/SEYYEDMortezaMuqeemi">Seyed Morteza Moghimi</a></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://covenantuniversity.academia.edu/OIDOWUBISMARK"><img class="profile-avatar u-positionAbsolute" alt="Olabode IDOWU-BISMARK" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/66239856/25734851/24420746/s200_olabode.idowu-bismark.jpg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://covenantuniversity.academia.edu/OIDOWUBISMARK">Olabode IDOWU-BISMARK</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">Covenant University Canaanland, Ota.</p></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://independent.academia.edu/HossainMdBoktiar"><img class="profile-avatar u-positionAbsolute" alt="Md Boktiar Hossain" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/317464616/160187078/149875054/s200_md_boktiar.hossain.jpeg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/HossainMdBoktiar">Md Boktiar Hossain</a></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://independent.academia.edu/DeneshDas"><img class="profile-avatar u-positionAbsolute" alt="Denesh Das" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/323335100/165285757/155126966/s200_denesh.das.jpeg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://independent.academia.edu/DeneshDas">Denesh Das</a></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://agh.academia.edu/AndrzejO%C5%BCadowicz"><img class="profile-avatar u-positionAbsolute" border="0" alt="" src="//a.academia-assets.com/images/s200_no_pic.png" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://agh.academia.edu/AndrzejO%C5%BCadowicz">Andrzej Ożadowicz</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">AGH University of Science and Technology</p></div></div><div class="suggested-user-card"><div class="suggested-user-card__avatar social-profile-avatar-container"><a href="https://ttu-ee.academia.edu/NomanShabbir"><img class="profile-avatar u-positionAbsolute" alt="Noman Shabbir" border="0" onerror="if (this.src != '//a.academia-assets.com/images/s200_no_pic.png') this.src = '//a.academia-assets.com/images/s200_no_pic.png';" width="200" height="200" src="https://0.academia-photos.com/167626714/49669496/37652453/s200_noman.shabbir.jpeg" /></a></div><div class="suggested-user-card__user-info"><a class="suggested-user-card__user-info__header ds2-5-body-sm-bold ds2-5-body-link" href="https://ttu-ee.academia.edu/NomanShabbir">Noman Shabbir</a><p class="suggested-user-card__user-info__subheader ds2-5-body-xs">Tallinn University of Technology</p></div></div></ul></div><div class="ri-section"><div class="ri-section-header"><span>Interests</span><a class="ri-more-link js-profile-ri-list-card" data-click-track="profile-user-info-primary-research-interest" data-has-card-for-ri-list="116522139">View All (9)</a></div><div class="ri-tags-container"><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="116522139" href="https://www.academia.edu/Documents/in/Lecturer"><div id="js-react-on-rails-context" style="display:none" data-rails-context="{"inMailer":false,"i18nLocale":"en","i18nDefaultLocale":"en","href":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","location":"/IfeanyiNwokoro","scheme":"https","host":"rhemauniversity.academia.edu","port":null,"pathname":"/IfeanyiNwokoro","search":null,"httpAcceptLanguage":null,"serverSide":false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Lecturer"]}" data-trace="false" data-dom-id="Pill-react-component-e6a67b13-d52d-4d58-9688-97834d74dbb1"></div> <div id="Pill-react-component-e6a67b13-d52d-4d58-9688-97834d74dbb1"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="116522139" href="https://www.academia.edu/Documents/in/Higher_Edcation"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Higher Edcation"]}" data-trace="false" data-dom-id="Pill-react-component-f5e16bd5-dd6a-4a1d-96c9-f0f820087d64"></div> <div id="Pill-react-component-f5e16bd5-dd6a-4a1d-96c9-f0f820087d64"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="116522139" href="https://www.academia.edu/Documents/in/Urban_Design"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Urban Design"]}" data-trace="false" data-dom-id="Pill-react-component-7323964b-d969-4230-a667-8a62af8c4c46"></div> <div id="Pill-react-component-7323964b-d969-4230-a667-8a62af8c4c46"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="116522139" href="https://www.academia.edu/Documents/in/Urban_Planning"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Urban Planning"]}" data-trace="false" data-dom-id="Pill-react-component-43b87488-355d-4bc8-b721-98e52181cbfc"></div> <div id="Pill-react-component-43b87488-355d-4bc8-b721-98e52181cbfc"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="116522139" href="https://www.academia.edu/Documents/in/Economics"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{"color":"gray","children":["Economics"]}" data-trace="false" data-dom-id="Pill-react-component-a30ed00d-48d1-4522-8c24-6ae9f0c9d7d6"></div> <div id="Pill-react-component-a30ed00d-48d1-4522-8c24-6ae9f0c9d7d6"></div> </a></div></div><div class="external-links-container"><ul class="profile-links new-profile js-UserInfo-social"><li class="profile-profiles js-social-profiles-container"><i class="fa fa-spin fa-spinner"></i></li></ul></div></div></div><div class="right-panel-container"><div class="user-content-wrapper"><div class="uploads-container" id="social-redesign-work-container"><div class="upload-header"><h2 class="ds2-5-heading-sans-serif-xs">Uploads</h2></div><div class="documents-container backbone-social-profile-documents" style="width: 100%;"><div class="u-taCenter"></div><div class="profile--tab_content_container js-tab-pane tab-pane active" id="all"><div class="profile--tab_heading_container js-section-heading" data-section="Papers" id="Papers"><h3 class="profile--tab_heading_container">Papers by Prof. Ifeanyi S Nwokoro</h3></div><div class="js-work-strip profile--work_container" data-work-id="127096915"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/127096915/Investigating_the_Impact_of_AI_ML_for_Monitoring_and_Optimizing_Energy_Usage_in_Smart_Homes"><img alt="Research paper thumbnail of Investigating the Impact of AI/ML for Monitoring and Optimizing Energy Usage in Smart Homes" class="work-thumbnail" src="https://attachments.academia-assets.com/120880961/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/127096915/Investigating_the_Impact_of_AI_ML_for_Monitoring_and_Optimizing_Energy_Usage_in_Smart_Homes">Investigating the Impact of AI/ML for Monitoring and Optimizing Energy Usage in Smart Homes</a></div><div class="wp-workCard_item"><span>Universal Wiser Publisher</span><span>, 2025</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Integrating artificial intelligence (AI) and machine learning (ML) into smart home systems has si...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Integrating artificial intelligence (AI) and machine learning (ML) into smart home systems has significantly advanced and improved residential energy efficiency, addressing growing concerns around energy conservation and sustainability. Choosing appropriate AI/ML techniques to optimize energy consumption in the dynamic and contemporary smart home environment remains a complex challenge. This study investigates a range of AI/ML algorithms such as regression models, deep learning, clustering, and decision trees to enhance energy management in smart homes. The study highlights the core processes of smart home energy optimization, including data acquisition, feature extraction, and model evaluation, as well as the specific roles of each AI/ML technique in optimizing energy usage. The study also discusses the strengths and weaknesses of the AI/ML techniques used for smart homes. It further explores the application areas and emerging challenges such as data security risks, high implementation costs, and gaps in existing technology that impact the scalability of AI/ML solutions in smart home contexts. The findings reveal that AI/ML techniques can effectively transform energy management in smart homes, enabling real-time optimization and adaptive decision-making to minimize energy consumption and reduce costs. Additionally, the study highlights future research directions.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="56091f9df56dab98db5cd94d7337f65a" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":120880961,"asset_id":127096915,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/120880961/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="127096915"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="127096915"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 127096915; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=127096915]").text(description); $(".js-view-count[data-work-id=127096915]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 127096915; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='127096915']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "56091f9df56dab98db5cd94d7337f65a" } } $('.js-work-strip[data-work-id=127096915]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":127096915,"title":"Investigating the Impact of AI/ML for Monitoring and Optimizing Energy Usage in Smart Homes","internal_url":"https://www.academia.edu/127096915/Investigating_the_Impact_of_AI_ML_for_Monitoring_and_Optimizing_Energy_Usage_in_Smart_Homes","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":120880961,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/120880961/thumbnails/1.jpg","file_name":"Investigating_the_Impact_of_AI_ML_for_Monitoring_and_Optimizing_Energy.pdf","download_url":"https://www.academia.edu/attachments/120880961/download_file","bulk_download_file_name":"Investigating_the_Impact_of_AI_ML_for_Mo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/120880961/Investigating_the_Impact_of_AI_ML_for_Monitoring_and_Optimizing_Energy-libre.pdf?1737178253=\u0026response-content-disposition=attachment%3B+filename%3DInvestigating_the_Impact_of_AI_ML_for_Mo.pdf\u0026Expires=1740485480\u0026Signature=RrYxPFQ6SwlUBLxiDgJR94nVhOQgT4A61cozUzCt1CthnPDCV2phhtXKLEATPdXtazZLKPoj1NbBvDRfj~FbzyZLHF9VY4xLqu5coRQYOOeVw5~thBJy-hblkaNPTzlTsfvvtQBfGhFZkBOX3LrMePrV0S79mK99qhWOqtySkEa7BTEGFP4Vb2JQrIUhE~39qNFWaD6kqlgkn6Tzk-tJlGw2Qyn4KYKdq0TK9jxzOMqQnSfilF5grwyGWW4DwdJCXgxFJh3yC0Y7JE0S1q2KcfzPOSbwZTsuVjtyR7ut-S8XH9iTn2sA1eeGBhu8qnrHGwASIUaHUiDSfpDYLpXbiA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="124384378"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/124384378/CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_THE_IOT_DEVICES"><img alt="Research paper thumbnail of CYBER ATTACK DETECTION AND DEFENSE FOR THE IOT DEVICES" class="work-thumbnail" src="https://attachments.academia-assets.com/118620572/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/124384378/CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_THE_IOT_DEVICES">CYBER ATTACK DETECTION AND DEFENSE FOR THE IOT DEVICES</a></div><div class="wp-workCard_item"><span>International Research Journal of Modernization in Engineering Technology and Science (IRJMET)</span><span>, 2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">As more and more Internet of Things (IoT) devices are included into Cyber-Physical Systems (CPS),...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">As more and more Internet of Things (IoT) devices are included into Cyber-Physical Systems (CPS), it is critical to maintain the security of these networked systems. This work focuses on using Support Vector Machine (SVM) models to create and deploy a cyber attack detection system for IoT-based CPS. The SVM model is trained on historical data to discern between normal and harmful behavior patterns displayed by IoT devices within the CPS. The SVM model is well-known for its efficacy in binary classification tasks. Through training to understand the system's typical behavior, the SVM model gains the ability to recognize variations that could be signs of a cyber-attack. Simulations and real-world tests show how well the SVM-based detection system works to identify different kinds of cyber-threats. This study does, however, admit several shortcomings. The dynamic and changing nature of cyber threats may have an effect on the SVM model's performance because it mostly depends on previous data for training and detection accuracy problems. In this study work, a novel CNN model based on deep learning was proposed in order to overcome the shortcomings of the current cyber threat detection model. The suggested model enhances performance metrics and the detection of cyber-attacks. When compared to the existing model, the new model performs better. The f1-score, accuracy, precision, and recall metrics are used to gauge performance.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="70ede752e4943557e0260be9dfb31245" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":118620572,"asset_id":124384378,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/118620572/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="124384378"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="124384378"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 124384378; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=124384378]").text(description); $(".js-view-count[data-work-id=124384378]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 124384378; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='124384378']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "70ede752e4943557e0260be9dfb31245" } } $('.js-work-strip[data-work-id=124384378]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":124384378,"title":"CYBER ATTACK DETECTION AND DEFENSE FOR THE IOT DEVICES","internal_url":"https://www.academia.edu/124384378/CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_THE_IOT_DEVICES","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","email":"YktBRit0cWllTkU3UXdVOGhrZy80Z3I4aGs2RFN2cXNvaExMV04vUUVUZ3d2NzM5UjdUWTI1cGl2WDlxZTQ1di0tNTdQOGFJUjV3ZVNLamlvMEtya2QyUT09--52042ed666585e2cd5c2b0c13c64a6d0b5ebbbc3"},"attachments":[{"id":118620572,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/118620572/thumbnails/1.jpg","file_name":"CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_THE_IOT_DEVICES.pdf","download_url":"https://www.academia.edu/attachments/118620572/download_file","bulk_download_file_name":"CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_T.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/118620572/CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_THE_IOT_DEVICES-libre.pdf?1727955930=\u0026response-content-disposition=attachment%3B+filename%3DCYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_T.pdf\u0026Expires=1740381753\u0026Signature=TQh-wGPV8uiUBhHk6pEDfpo~4246mrIv4QDoiXuHkG2zkOiEmfdJZQLaNtAad0x9-HhQdEiLiZ~URAF7F8EFwAuf1UNW~dWDbbrqGc5OZARhvHFxWrfpt0m55fEyGe5oaJEVaQU8GXhkZ9fdkXXhZyhjJpKvJKM-gQfPMIMtS0cH4CeDtzV2I6OTymqZ3vBKr9Rk0lg9ozbhNv7mSQPQMnMHhCwK5U0FXx0ni5niz5MOKQ32kOoDm9iDeqrHY2Iq7cvnFUML~Ey2DXmTnc-teWCi8BJnGAHxsL18Gp886y6exFoZPK9fiywK9yjAeDUwqZteWRvkE8LRCGtHEHOnVw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":118620594,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/118620594/thumbnails/1.jpg","file_name":"CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_THE_IOT_DEVICES.pdf","download_url":"https://www.academia.edu/attachments/118620594/download_file","bulk_download_file_name":"CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_T.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/118620594/CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_THE_IOT_DEVICES-libre.pdf?1727968179=\u0026response-content-disposition=attachment%3B+filename%3DCYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_T.pdf\u0026Expires=1740381753\u0026Signature=Qj8jgXTb~~K2CIuiMO7Nezlp7qFqQEu2JVQDpICkj2iW66RN7z4rW0Cc9LudLzyXw1kFEfPmpeTECXsmqfEtPspernbbKxTPOfx8OW0YnOwKFSBsE8i0lRTg2FylrpfRoAsG7xGBCLx1qfHzI06nQSKoBS56OxA1JuUt2RzD1bxEJk-iMyHvwB-J7iTcM1hHMp1sZB-310oEqaJTV91jOcmWhplqhGfoB~8V~Q05TyRk9tDBd9OLhVZ2vo~0UJuXaUErw~Fg3WVpnM-k8pzAgZ4MdxWQRW7w2ZRxneWliTEc~ifcS~fVJCG77QvLDCyArykoxpZ-3M4W91KSAF3Qwg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":118620409,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/118620409/thumbnails/1.jpg","file_name":"CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_THE_IOT_DEVICES.pdf","download_url":"https://www.academia.edu/attachments/118620409/download_file","bulk_download_file_name":"CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_T.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/118620409/CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_THE_IOT_DEVICES-libre.pdf?1727955990=\u0026response-content-disposition=attachment%3B+filename%3DCYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_T.pdf\u0026Expires=1740381753\u0026Signature=gjsmg3MeiUOJUa7r7p-5AY5Q7ErM2sq2rpPgHfecMvUKG1fD943MrWCjIaJg5~ErBpADyHzNCd2pf1t8j5FHdyAAU3jhwetv0l1njCovW-wV-lpQn2FUctdh1qLqM3HSq4c9YHX6koajdF6nQQx5fSGPLIrBT7Z0y~bvZerAM4jQiHC76Xxy3XNjGNhgd-7QXesnu-8CNu8d77gBVE0ILccTZ5U0MLwCJb6RMPveHj6DZD1LxUH9t3zyb1jZVFmi2AzOQiFE7h3kArG546yek34EgQweoL8Mv0lS-Hti4I2SGlnCdvNLpx4-E0~dkgMhWICwTJ~-M7ACFgaY-FMJgQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="124298533"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/124298533/Cyber_Security_Improvements_and_Vulnerability_Management_in_Digital_Settings"><img alt="Research paper thumbnail of Cyber Security Improvements and Vulnerability Management in Digital Settings" class="work-thumbnail" src="https://attachments.academia-assets.com/118550877/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/124298533/Cyber_Security_Improvements_and_Vulnerability_Management_in_Digital_Settings">Cyber Security Improvements and Vulnerability Management in Digital Settings</a></div><div class="wp-workCard_item"><span>Cyber Security Improvements and Vulnerability Management in Digital Settings</span><span>, 2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The goal of this study was to provide a thorough framework that would increase vulnerability mana...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The goal of this study was to provide a thorough framework that would increase vulnerability management and cyber security in a digital setting. The research examined the difficulties in managing vulnerabilities in digital settings, concentrating on cyber-physical power systems (CPPS). Existing Cyber Security frameworks such as NIST, ISO 27001, and ISA/IEC 62443 were assessed for their application to CPPS through a thorough analysis of the literature. Important weaknesses and attack avenues specific to CPPS's integration of information and operational technology were found. It was investigated how artificial intelligence (AI) might both strengthen cyber security defenses and make more complex AI-driven attacks possible. It was noted that there are shortcomings in the present frameworks, namely the absence of standardized AI integration and real-time threat detection capabilities. The study combined its findings to suggest a holistic framework that fills in these gaps, including techniques to successfully manage new cyber dangers and guidance for using AI in a secure manner. The report suggested creating AI-specific security guidelines, encouraging multidisciplinary cooperation, and making sure framework changes are made on a regular basis to keep up with the changing world of cyber-threats. The goal of this research was to increase vital digital infrastructures' resilience to cyber-attacks.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="479d2586f935dd558368d07af96c1df6" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":118550877,"asset_id":124298533,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/118550877/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="124298533"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="124298533"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 124298533; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=124298533]").text(description); $(".js-view-count[data-work-id=124298533]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 124298533; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='124298533']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "479d2586f935dd558368d07af96c1df6" } } $('.js-work-strip[data-work-id=124298533]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":124298533,"title":"Cyber Security Improvements and Vulnerability Management in Digital\r\nSettings","internal_url":"https://www.academia.edu/124298533/Cyber_Security_Improvements_and_Vulnerability_Management_in_Digital_Settings","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","email":"WmNEb3JRbm5sOWJmQjlNSjRxTEJmV09PTHo5b0I1VzlsOHl4TDhxRFZ6R2FlVW1uZTJTbUV3ZGhXd00zWnlFTC0tL3NBMklqTjJMUWc1MmVnOENCMVhJdz09--e60efbf119f82ab8d08d3431f99440cc5f806d76"},"attachments":[{"id":118550877,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/118550877/thumbnails/1.jpg","file_name":"Cyber_Security_Improvements_and_Vulnerability_Management_in_Digital_Settings.pdf","download_url":"https://www.academia.edu/attachments/118550877/download_file","bulk_download_file_name":"Cyber_Security_Improvements_and_Vulnerab.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/118550877/Cyber_Security_Improvements_and_Vulnerability_Management_in_Digital_Settings-libre.pdf?1727725650=\u0026response-content-disposition=attachment%3B+filename%3DCyber_Security_Improvements_and_Vulnerab.pdf\u0026Expires=1740381753\u0026Signature=gO1ZO4K1~06OIRoUnpzRplA4he2P6FldzQ776aE~NjoV-~TkyuHtLb-x2qsebgMrQ9iszhewsOcYimD95CT8lA~-oxlsNhKObv-WpMTEOfFx8tUjxNLAZwJ6xG9-ITrDEsymvGvo3LuEUOAg6VABCFMZrzjxHtM9cHZ1XQe8SS8HPa3prUcx0M-~b~7jhIYmDQ~WI6CkOXCYM3Fr2rqG5ydhI6TWcqibPXv2XQT516yE3LFa3x~ENWzhlgFzLiOiYk~3eOAx1IP2u0uNFNUiuc-t5kwwPUu~G-D9kTz9OLHOQ-xdMceKZVCKhBpwSpEydZ9aoKQ90NqvQbI2UAlMwg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":118550769,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/118550769/thumbnails/1.jpg","file_name":"Cyber_Security_Improvements_and_Vulnerability_Management_in_Digital_Settings.pdf","download_url":"https://www.academia.edu/attachments/118550769/download_file","bulk_download_file_name":"Cyber_Security_Improvements_and_Vulnerab.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/118550769/Cyber_Security_Improvements_and_Vulnerability_Management_in_Digital_Settings-libre.pdf?1727725678=\u0026response-content-disposition=attachment%3B+filename%3DCyber_Security_Improvements_and_Vulnerab.pdf\u0026Expires=1740381753\u0026Signature=PUjpjv~qG~dQUNZQJNJ1Jq1obRwqFE7cT-Pq8tesUWgoBUglYmBmcVmxk7hS10J-kINBk8Im6Z6uCLucX0sGNtLayhWfIN0Ud-6u-ePprDJXTzJHY6qfq30QrnFQQ85jaSLd8whUwNLKFOMDadbVk8B27M~2xvSNCrMnBqZY4tg8J2mh14t2RgoMC~UYqLLMJeu6dXpEdN8t3~Pn96-VbrdlkESzsbXLidT7yOu0I3HXpcsJUW7J5Gnfah0TekVAdS6dE3a607f27qTuVuzgx202w--dOnjMaOk6P7Gz~AY9N~fkBROMDgGHgU4SGIESM5vj9gz5zFP4uIRU0AdO5g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="124058376"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/124058376/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift"><img alt="Research paper thumbnail of Technology Advancement and University Education in Nigeria: History, Trade Unionism and Pattern-Shift" class="work-thumbnail" src="https://attachments.academia-assets.com/118551141/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/124058376/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift">Technology Advancement and University Education in Nigeria: History, Trade Unionism and Pattern-Shift</a></div><div class="wp-workCard_item"><span>INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY (IJIRT)</span><span>, 2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">University education is currently the climax of the educational learning processes in Nigeria. It...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">University education is currently the climax of the educational learning processes in Nigeria. It is an imperative and most critical part of human development given to the fact that it is a base for high-level skills acquirement and an essential qualification for the labour market. Universities empower and release graduates who turn to become workforce and are suitable and extremely useful for economic development. The education sector in Nigeria is relatively thriving and somewhat productive to the stakeholders especially during the advent of the fourth republic. In 1999, the Federal Government of Nigeria licensed the public to establish private universities to create room for competition regarding academic standards and infrastructural facilities that will support qualitative education for the people.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="4660cd87f7a24f6c69453f5c42a78880" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":118551141,"asset_id":124058376,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/118551141/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="124058376"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="124058376"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 124058376; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=124058376]").text(description); $(".js-view-count[data-work-id=124058376]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 124058376; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='124058376']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "4660cd87f7a24f6c69453f5c42a78880" } } $('.js-work-strip[data-work-id=124058376]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":124058376,"title":"Technology Advancement and University Education in Nigeria: History, Trade Unionism and Pattern-Shift","internal_url":"https://www.academia.edu/124058376/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","email":"QzNRV3RFVGIwK0NRYnhFS1FmSkx6d01NUURUWEVyYUlhOWphVWpzZ0N3bkZVdWZodkhTYU9JaEVpSVVGcU5jci0tQ3V5cjJQb0pjMXBQSWRQdlN0T1dmdz09--0089aa363471c451d5ba37849424f7c96ea67b15"},"attachments":[{"id":118551141,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/118551141/thumbnails/1.jpg","file_name":"Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift.pdf","download_url":"https://www.academia.edu/attachments/118551141/download_file","bulk_download_file_name":"Technology_Advancement_and_University_Ed.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/118551141/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift-libre.pdf?1727721437=\u0026response-content-disposition=attachment%3B+filename%3DTechnology_Advancement_and_University_Ed.pdf\u0026Expires=1740381753\u0026Signature=GJki5As0UwexKWcMPpHKlU27kk9OdHTAMRQLMVp7ZtDNdPKl8JjC7xYyylWu9oQpbqntJz1tXA7MbUHoKe~7-6OZakUIU7PPVMTNX3bXbbocVkGCyD3DFt3CVQASK6ET-ELvALUsU~3PrBJ8TQiSPIyJ93RRs2G8h2OM2Ft1ihd6xPxEbOq0LsfzoyTW5VbPSmuGxCKlzB4klASL27FvqJlg4h5DoDUa3wkpA3l36dD39zt9fK5cUumT6xaqonsm3us2j8S05STfyC4kRFA0s6yXhrv6D0BTM-FyKA9od2NpdfjXmz8hFwlWHTdiNbt3ujoGriCyOsxYsIF7dlT12g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":118551127,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/118551127/thumbnails/1.jpg","file_name":"Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift.pdf","download_url":"https://www.academia.edu/attachments/118551127/download_file","bulk_download_file_name":"Technology_Advancement_and_University_Ed.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/118551127/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift-libre.pdf?1727725580=\u0026response-content-disposition=attachment%3B+filename%3DTechnology_Advancement_and_University_Ed.pdf\u0026Expires=1740381753\u0026Signature=Dd3udZOFKnWnwieLIUfBnrVnvv7D7gGzujkykdaem9ZDR9J82eh37HLLtlLLLtg-z2JMfKvE1zebcIbfOdE7qwGmt5FsRovBhfkVhjTBcvImaNU8nX3ol0XLkM2Ot6AJ3QpLBnJ59XcXeBtZfI5Z2FsE7gipRT3TSXnHZHRAhuB77WOioMtHFUMju6MxWsIYzgo62nXRg0UbCNQLeUXe66gpUcervfSHDPOcvePj9tN~bOadAxhw6wZ04XoaFslg9nkIzkrKXRRFfj7nMkvn6QYQGTXSuBwRivVNPorn2XnZ0FH2TFdox23Y1GQBGumpTzownOj9rCRCJeXTrPioyQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":118354086,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/118354086/thumbnails/1.jpg","file_name":"Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift.pdf","download_url":"https://www.academia.edu/attachments/118354086/download_file","bulk_download_file_name":"Technology_Advancement_and_University_Ed.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/118354086/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift-libre.pdf?1726952768=\u0026response-content-disposition=attachment%3B+filename%3DTechnology_Advancement_and_University_Ed.pdf\u0026Expires=1740381753\u0026Signature=eZ1dJylgetdoYiVpupTBpuzf3anSDeQdexr8p4fUEHG3d1LOU0deW~zC6Z0jKGaNALPXzO-ESNsJKC3e2qT9IfHsL9iNpodVdCr6K06oXub1Xfbvf6HfCH9Xdz7ZLRxdYLj56ITLh7dPyZBfjwsjxZ8hT9QqbUxKOP7SwlxsSdUYNm3ETFQMjdRRBzur5FgPQlEjtnAm4Ao3OcjLdhYswg64TouArJxhyrbgw3~wLq-LQ5exHsTR4K-3TODwJDhwdRB2y7zTroEB8y0KTqgZrG85S~WgV9J2Y8aDT62PUGMdBAHHqJL0LuIbR25fnV3-DUPNY3HBHn4gt2oXnX0GHg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="122015374"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/122015374/Phishing_Attacks_Prevention_using_Smart_Based_Artificial_Intelligence_Algorithms_for_Cyber_Security_Awareness"><img alt="Research paper thumbnail of Phishing Attacks Prevention using Smart Based Artificial Intelligence Algorithms for Cyber Security Awareness" class="work-thumbnail" src="https://attachments.academia-assets.com/116763293/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/122015374/Phishing_Attacks_Prevention_using_Smart_Based_Artificial_Intelligence_Algorithms_for_Cyber_Security_Awareness">Phishing Attacks Prevention using Smart Based Artificial Intelligence Algorithms for Cyber Security Awareness</a></div><div class="wp-workCard_item"><span>International Journal of Innovative Research in Technology (IJIRT). </span><span>, 2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">It has been said that machine learning is a useful defense against the majority of cyber-attacks....</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">It has been said that machine learning is a useful defense against the majority of cyber-attacks. Therefore, the majority of computer attacks now have greater security thanks to the development of Artificial Intelligence (AI). Phishing assaults are dangerous, but they may be avoided using AI-powered solutions. This element points to the necessity of raising awareness of cyber security using AI. Most people's awareness will help to stop these kinds of attacks. The study explains how phishing attempts could be decreased if people were aware of AI-based cyber protection. Thus, the study illustrates the efficacy of AI-driven cyber security awareness education and its potential to impact cyberattacks.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="b69b48d6be9548568d4133775e532d43" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":116763293,"asset_id":122015374,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/116763293/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="122015374"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="122015374"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 122015374; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=122015374]").text(description); $(".js-view-count[data-work-id=122015374]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 122015374; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='122015374']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "b69b48d6be9548568d4133775e532d43" } } $('.js-work-strip[data-work-id=122015374]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":122015374,"title":"Phishing Attacks Prevention using Smart Based Artificial Intelligence Algorithms for Cyber Security Awareness","internal_url":"https://www.academia.edu/122015374/Phishing_Attacks_Prevention_using_Smart_Based_Artificial_Intelligence_Algorithms_for_Cyber_Security_Awareness","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":116763293,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/116763293/thumbnails/1.jpg","file_name":"Phishing_Attacks_Prevention_using_Smart_Based_Artificial_Intelligence_Algorithms_for_Cyber_Security_Awareness.pdf","download_url":"https://www.academia.edu/attachments/116763293/download_file","bulk_download_file_name":"Phishing_Attacks_Prevention_using_Smart.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/116763293/Phishing_Attacks_Prevention_using_Smart_Based_Artificial_Intelligence_Algorithms_for_Cyber_Security_Awareness-libre.pdf?1721440568=\u0026response-content-disposition=attachment%3B+filename%3DPhishing_Attacks_Prevention_using_Smart.pdf\u0026Expires=1740485480\u0026Signature=EzDnnT-Vfh9U5oEu3Arrhs3xJpA56PbJQkoUy7INafCZ23NYNXO~Awc2KbDt-beRvCR9DXwnrTG2v2tNJbPHxxyCiOtZYyyobqRLIQPFg8w2s4yQoLHbdA4BxtdPbs7zPygpGojArbU30UHXTYjCCmYbRQQc1nuNxun7oKrHUqX8yh4wZ9ajp9I7--JAbwKO17DH~4x1I1Mf1iERr5ccqIWQ6tDQIvLTXPorzxSaj2PLXa3MI1ayI-KvCOZXAG8sNxnrudcYX5qAMGo3JM~KfB1lHFAvOEnM4zolJYySvin--~waymPscOtFfrlfmoZftkwWbIYtCpEcwklkmlV1gA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="121803001"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/121803001/Recently_Emerging_Trends_in_Embedded_Computer_Vision"><img alt="Research paper thumbnail of Recently Emerging Trends in Embedded Computer Vision" class="work-thumbnail" src="https://attachments.academia-assets.com/116598911/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/121803001/Recently_Emerging_Trends_in_Embedded_Computer_Vision">Recently Emerging Trends in Embedded Computer Vision</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://rhemauniversity.academia.edu/IfeanyiNwokoro">Prof. Ifeanyi S Nwokoro</a>, <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/IKEGWU">ANAYO IKEGWU</a>, and <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/ELongkang">Emmanuel Longkang</a></span></div><div class="wp-workCard_item"><span>International Conference on Technological Solutions for Smart Economy| SmartEco’2024</span><span>, 2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">We explore recent advancements in embedded computer vision, particularly in object detection, rec...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">We explore recent advancements in embedded computer vision, particularly in object detection, recognition, and tracking. This study was motivated by the need to comprehend and optimize embedded vision technology; it meticulously examines various artificial intelligence methods and algorithms tailored for this field. By scrutinizing their strengths and weaknesses, it aims to address existing challenges and enhance performance. Additionally, the research surveys diverse application domains, such as drone-based object detection and traffic sign recognition, to demonstrate the practical relevance and adaptability of embedded vision technology across sectors. Through synthesizing key insights, including the significance of popular algorithms like YOLO (You Only Look Once) and the impact of large datasets on performance improvement, the study seeks to provide a comprehensive understanding of embedded vision technology. Ultimately, it aims to guide future efforts in this field, facilitating the creation of innovative solutions for real-world challenges.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="ffd11dc8a76c6900e9f86eb6754c80a2" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":116598911,"asset_id":121803001,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/116598911/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="121803001"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="121803001"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 121803001; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=121803001]").text(description); $(".js-view-count[data-work-id=121803001]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 121803001; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='121803001']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "ffd11dc8a76c6900e9f86eb6754c80a2" } } $('.js-work-strip[data-work-id=121803001]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":121803001,"title":"Recently Emerging Trends in Embedded Computer Vision","internal_url":"https://www.academia.edu/121803001/Recently_Emerging_Trends_in_Embedded_Computer_Vision","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":116598911,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/116598911/thumbnails/1.jpg","file_name":"Recently_Emerging_Trends_in_Embedded_Computer_Vision.pdf","download_url":"https://www.academia.edu/attachments/116598911/download_file","bulk_download_file_name":"Recently_Emerging_Trends_in_Embedded_Com.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/116598911/Recently_Emerging_Trends_in_Embedded_Computer_Vision-libre.pdf?1720211226=\u0026response-content-disposition=attachment%3B+filename%3DRecently_Emerging_Trends_in_Embedded_Com.pdf\u0026Expires=1740485480\u0026Signature=TAtlpPK8vMLmtF2ljFa63MR~XPtdcZuXDkCTabhaSy1qqysYIYFQW7b3S0dXAHhhkJ5jT~ndxkuI1yBHY-7PSGJz0~F-quznjXABul2uoLan5zjfyWBsQEHlVaH20xodV~tSf0Z1E7GrFIwDVubQ4hMpZ5wguHQkR2rPRRy9ABvoRB64MzvyhcI-sTG7zB-GJT4BHEFiutUIFv6JteJEdlK07fCDOU5~0cjWz-rg3VmqWhz07zZwOWc2vu9hbZOy8bq9dIpCs47RTB7LLdhTv0rVxIjX9LFNGfIucz6W8PLeeJ5E0dSU62tPTS8uRXErZvWZKTO24LyTzuHr2-crOw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="121802987"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/121802987/Implementing_Machine_Learning_Techniques_for_Artificial_Neural_Networks_in_5G_Network_Quality_of_Service_Management"><img alt="Research paper thumbnail of Implementing Machine Learning Techniques for Artificial Neural Networks in 5G Network Quality of Service Management" class="work-thumbnail" src="https://attachments.academia-assets.com/116598886/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/121802987/Implementing_Machine_Learning_Techniques_for_Artificial_Neural_Networks_in_5G_Network_Quality_of_Service_Management">Implementing Machine Learning Techniques for Artificial Neural Networks in 5G Network Quality of Service Management</a></div><div class="wp-workCard_item"><span>International Conference on Technological Solutions for Smart Economy| SmartEco’2024</span><span>, 2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">5G-New scenario transparency in communication between various types of networks that are intercon...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">5G-New scenario transparency in communication between various types of networks that are interconnected is expected in radio multimedia. A prevalent issue across all these diverse platforms is the equitable distribution of the restricted network resource among rival apps. A transcendent measure of how equitably properties are distributed to end-users is called Quality of Service (QoS). It is derived from subscriber satisfaction levels and depends on how quickly the network responds to possible infractions of established regulatory guidelines. There are discussion on the perspective of 5G network trust in terms of QoS management, demand formulation, xMBB, M-MTC, and U-MTC. There is a proposed architecture that controls access in the 5G network's data plane. A new cognitive engine for artificial intelligence that is built on memory is put forth. The idea is to translate the probabilistic sign of a set of variables related to resource distribution to the end-user for multi-service improvement.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="3280055ce2db35048d414ed5c238f60d" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":116598886,"asset_id":121802987,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/116598886/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="121802987"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="121802987"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 121802987; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=121802987]").text(description); $(".js-view-count[data-work-id=121802987]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 121802987; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='121802987']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "3280055ce2db35048d414ed5c238f60d" } } $('.js-work-strip[data-work-id=121802987]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":121802987,"title":"Implementing Machine Learning Techniques for Artificial Neural Networks in 5G Network Quality of Service Management","internal_url":"https://www.academia.edu/121802987/Implementing_Machine_Learning_Techniques_for_Artificial_Neural_Networks_in_5G_Network_Quality_of_Service_Management","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":116598886,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/116598886/thumbnails/1.jpg","file_name":"Implementing_Machine_Learning_Techniques_for_Artificial_Neural_Networks_in_5G_Network_Quality_of_Service_Management.pdf","download_url":"https://www.academia.edu/attachments/116598886/download_file","bulk_download_file_name":"Implementing_Machine_Learning_Techniques.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/116598886/Implementing_Machine_Learning_Techniques_for_Artificial_Neural_Networks_in_5G_Network_Quality_of_Service_Management-libre.pdf?1720211248=\u0026response-content-disposition=attachment%3B+filename%3DImplementing_Machine_Learning_Techniques.pdf\u0026Expires=1740485480\u0026Signature=Ia6z~Vm4~XCf6yOBn5wtShbflEUzs-juHD5Sgr4yCny5l4folvr0jQ9OmUpUmFc2GhKgaT1NHHKBoK49bz1ASdgsBJVB-8wu64MUrlzBOkD99m701DvPZ65x5S50PnG-o3eALXUQhXmBIY3yPu3vjuFO-Fb2zOxe0Q~1eB0pY6S89nu4fhXLcvUpQjECEptNbf5yTGKlAPa1~QOw2WM2NlJmZ-kkDUAfoARThFON5bgTyJkWYp1XO~7-Dm3GZbcHmcNDIIb0LVxnA-pH7FlmBMPfKrUFw-ilYirszH0IEt97NAtxMmJOYDVGX8TTpK8GorBwm6rtY89TNwequiNMsQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="121802882"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/121802882/Implementation_of_eHealth_Framework_for_Medical_Image_Analysis_using_Human_centered_Artificial_Intelligence_for_Cardiovascular_Diseases"><img alt="Research paper thumbnail of Implementation of eHealth Framework for Medical Image Analysis using Human-centered Artificial Intelligence for Cardiovascular Diseases" class="work-thumbnail" src="https://attachments.academia-assets.com/116598874/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/121802882/Implementation_of_eHealth_Framework_for_Medical_Image_Analysis_using_Human_centered_Artificial_Intelligence_for_Cardiovascular_Diseases">Implementation of eHealth Framework for Medical Image Analysis using Human-centered Artificial Intelligence for Cardiovascular Diseases</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://rhemauniversity.academia.edu/IfeanyiNwokoro">Prof. Ifeanyi S Nwokoro</a> and <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/JulianaOnah1">Onah J U L I A N A Obianuju</a></span></div><div class="wp-workCard_item"><span>International Conference on Technological Solutions for Smart Economy| SmartEco’2024</span><span>, 2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Human-centered artificial intelligence (HCAI) is pivotal for timely diagnosis and prediction of a...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Human-centered artificial intelligence (HCAI) is pivotal for timely diagnosis and prediction of ailments such as hypertension, stroke, and diabetes. This paper explores HCAI's role in early disease detection and immediate treatment solutions of the detected diseases. By designing transparent, ethical, and interactive systems, HCAI ensures the best interests of humans are upheld. Leveraging machine learning (ML) techniques, including Decision Tree, Random Forest, and K-Nearest Neigbor. The study attains high predictive accuracy in identifying diseases using the ML techniques. The analysis reveals factors influencing healthy living, facilitating early diagnosis. Results indicate significant improvement of 2% for decision tree and random forest respectively when compared with the baseline studies. Through predictive modeling, HCAI enhances disease analysis efficiency and patient care, offering accurate and timely diagnoses. This underscores the significance of integrating HCAI techniques for improved healthcare outcomes, empowering users with system understanding and control.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="37839f1498376f298eb3552fc09529d8" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":116598874,"asset_id":121802882,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/116598874/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="121802882"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="121802882"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 121802882; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=121802882]").text(description); $(".js-view-count[data-work-id=121802882]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 121802882; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='121802882']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "37839f1498376f298eb3552fc09529d8" } } $('.js-work-strip[data-work-id=121802882]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":121802882,"title":"Implementation of eHealth Framework for Medical Image\r\nAnalysis using Human-centered Artificial Intelligence for\r\nCardiovascular Diseases","internal_url":"https://www.academia.edu/121802882/Implementation_of_eHealth_Framework_for_Medical_Image_Analysis_using_Human_centered_Artificial_Intelligence_for_Cardiovascular_Diseases","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","email":"bW9POURoSXdjbk04alFYOW56TzhUOHd0UXlqQSs0V0FpN0I4THNsTGwwWlYzMUhHQUVUSkxtMXU2MUt2NTZ6dC0tbjVmaGozbzdURzJJMUFXL25IdFNSdz09--9665c76a76283c35aab5c6e529df11578f8c5b89"},"attachments":[{"id":116598874,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/116598874/thumbnails/1.jpg","file_name":"Implementation_of_eHealth_Framework_for_Medical_Image.pdf","download_url":"https://www.academia.edu/attachments/116598874/download_file","bulk_download_file_name":"Implementation_of_eHealth_Framework_for.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/116598874/Implementation_of_eHealth_Framework_for_Medical_Image-libre.pdf?1720211249=\u0026response-content-disposition=attachment%3B+filename%3DImplementation_of_eHealth_Framework_for.pdf\u0026Expires=1740381439\u0026Signature=MdFCHJeKnkO3cyCzYmtiPKMiAu3FrjNcQCZOx7Clenz2MT9ylJ7w65ROFvF-7ugI4pF-Rqt4BCvZfqYSX5a5yjzyv9eAexXF8uoAzB9dCZBrFzcva-m-jx~UXl1~GnN4yy~jpA~flfojeTZSJ73bmsGYbtcyvM6qARmItBQ3gKYqbJU5QKKnhNNq6EMbmD2YenpIC9wKuoC-7przy1zP9DOcUNdb6UsrVosolRopu67a5AdhRDABcuDZ0SWFLAmK0PEiDaPzzatBJah9qQxzCmkkV9exVqgd7uJXmCHe804RK-8qVTe1Rh3tdCaPMWysxd1xnHnPVuxdxtNCpByvcQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="121802863"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/121802863/CYBER_SECURITY_RISK_ASSESSMENTS_COMPLIANCE_AND_VIOLATIONS_A_systematic_Review_of_the_intervening_role_of_top_Management_in_Organizations"><img alt="Research paper thumbnail of CYBER SECURITY RISK ASSESSMENTS, COMPLIANCE AND VIOLATIONS: A systematic Review of the intervening role of top Management in Organizations" class="work-thumbnail" src="https://attachments.academia-assets.com/116598848/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/121802863/CYBER_SECURITY_RISK_ASSESSMENTS_COMPLIANCE_AND_VIOLATIONS_A_systematic_Review_of_the_intervening_role_of_top_Management_in_Organizations">CYBER SECURITY RISK ASSESSMENTS, COMPLIANCE AND VIOLATIONS: A systematic Review of the intervening role of top Management in Organizations</a></div><div class="wp-workCard_item"><span>International Conference on Technological Solutions for Smart Economy| SmartEco’2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Study on how managers respond to cyber security breaches has focused on exterior activities, such...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Study on how managers respond to cyber security breaches has focused on exterior activities, such as customer service and crisis management. An internal breach inside the</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="c787e1b85b65890b5b1b4ae8d642882a" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":116598848,"asset_id":121802863,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/116598848/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="121802863"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="121802863"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 121802863; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=121802863]").text(description); $(".js-view-count[data-work-id=121802863]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 121802863; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='121802863']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "c787e1b85b65890b5b1b4ae8d642882a" } } $('.js-work-strip[data-work-id=121802863]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":121802863,"title":"CYBER SECURITY RISK ASSESSMENTS, COMPLIANCE AND VIOLATIONS: A systematic Review of the intervening role of top Management in Organizations","internal_url":"https://www.academia.edu/121802863/CYBER_SECURITY_RISK_ASSESSMENTS_COMPLIANCE_AND_VIOLATIONS_A_systematic_Review_of_the_intervening_role_of_top_Management_in_Organizations","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":116598848,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/116598848/thumbnails/1.jpg","file_name":"CYBER_SECURITY_RISK_ASSESSMENTS_COMPLIANCE_AND.pdf","download_url":"https://www.academia.edu/attachments/116598848/download_file","bulk_download_file_name":"CYBER_SECURITY_RISK_ASSESSMENTS_COMPLIAN.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/116598848/CYBER_SECURITY_RISK_ASSESSMENTS_COMPLIANCE_AND-libre.pdf?1720211268=\u0026response-content-disposition=attachment%3B+filename%3DCYBER_SECURITY_RISK_ASSESSMENTS_COMPLIAN.pdf\u0026Expires=1740485480\u0026Signature=dI0TrNwk-mX2xhTJIE4sAwntEyDL38m3jbDjl0jiLzNlmvEKlZwSqvQC1zufE-giTQHE7U4Uayjg0-HxmjjlHIH0J0gO1Xy679ZwfTCjkvnGxgewHLiLIAWE2rdEwfBkQSKWUZ4ir~6HZayyOBhlWY1~21MrbfQDfv7G4WdMOHCE1nG25ktN41RW1SxP0I6nm1J6dYMK8ahkzDw2H6xHouam60sOuX-Cwh0Sj0VSycqDIl1dW1YwVIimRwZuqlW4ZsHpkCXodmDZ2ooUzPLLzfIzLYQKYCe3pFqInq3ixT~YtMilh3UF0ztZw0KD2ysD89cgGDKqYwLUMYqcQ~FYTA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="121709986"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/121709986/CYBER_SECURITY_CHALLENGES_IN_A_SMART_AND_DIGITAL_ECONOMY_A_preliminary_research_overview_of_the_emerging_threats_to_data_stored_in_information_systems"><img alt="Research paper thumbnail of CYBER SECURITY CHALLENGES IN A SMART AND DIGITAL ECONOMY: A preliminary research overview of the emerging threats to data stored in information systems" class="work-thumbnail" src="https://attachments.academia-assets.com/116526222/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/121709986/CYBER_SECURITY_CHALLENGES_IN_A_SMART_AND_DIGITAL_ECONOMY_A_preliminary_research_overview_of_the_emerging_threats_to_data_stored_in_information_systems">CYBER SECURITY CHALLENGES IN A SMART AND DIGITAL ECONOMY: A preliminary research overview of the emerging threats to data stored in information systems</a></div><div class="wp-workCard_item"><span>Global Scientific Journals</span><span>, 2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">IT security incidents have evolved over the past few decades from isolated information system att...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">IT security incidents have evolved over the past few decades from isolated information system attacks to deliberate, focused and complex cyber dangers at even national, institutional or individual level. Digital technology's interconnectedness has many advantages, but it also creates a number of new risks that have broad ramifications. Even though the phrases are sometimes used synonymously, information security and cyber security are not the same. The transition from information security to cyber security was covered in this study, primarily as a paradigm shift in the defense against persistent threats. While it was sufficient to undertake basic defense against "common" attacks in the information security era, organizations now need to develop clever, creative, and effective controls to identify and stop sophisticated and emerging cyber-attacks. Cyber security initiatives should now involve the entire organization, including participation from all staff members, rather than just IT departments or designated persons. Cyber security should be strategically connected with corporate strategy, just as digital technologies are. We have carried out preliminary research on the level of maturity of security measures in Nigerian large firms that are associated with vital or significant national infrastructure. We concluded that while basic protection works well, there is still space for improvement when it comes to implementing more sophisticated controls and pursuing a shared goal of comprehensive cyber security governance.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="fbc0dd507ee36b52051cf83675107f36" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":116526222,"asset_id":121709986,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/116526222/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="121709986"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="121709986"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 121709986; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=121709986]").text(description); $(".js-view-count[data-work-id=121709986]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 121709986; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='121709986']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "fbc0dd507ee36b52051cf83675107f36" } } $('.js-work-strip[data-work-id=121709986]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":121709986,"title":"CYBER SECURITY CHALLENGES IN A SMART AND DIGITAL ECONOMY: A preliminary research overview of the emerging threats to data stored in information systems","internal_url":"https://www.academia.edu/121709986/CYBER_SECURITY_CHALLENGES_IN_A_SMART_AND_DIGITAL_ECONOMY_A_preliminary_research_overview_of_the_emerging_threats_to_data_stored_in_information_systems","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","email":"U0NubFgxSGxZUEJXYjdwcmJuSlByQlVRT3IxYk1oTW9Sa0dNVXAyWS9NMTBHdGZQY3RnNkpNRm5PV0R3bnNFYy0tZkY2TTEwTkZnRkI2aUQzMHhrQTdaQT09--0e9c5078b6ce000048fec7d904a3ba5c4a2273b7"},"attachments":[{"id":116526222,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/116526222/thumbnails/1.jpg","file_name":"CYBER_SECURITY_CHALLENGES_IN_A_SMART_AND_DIGITAL_ECONOMY.pdf","download_url":"https://www.academia.edu/attachments/116526222/download_file","bulk_download_file_name":"CYBER_SECURITY_CHALLENGES_IN_A_SMART_AND.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/116526222/CYBER_SECURITY_CHALLENGES_IN_A_SMART_AND_DIGITAL_ECONOMY-libre.pdf?1719914841=\u0026response-content-disposition=attachment%3B+filename%3DCYBER_SECURITY_CHALLENGES_IN_A_SMART_AND.pdf\u0026Expires=1740381753\u0026Signature=QVim3ohHbasgKCLWpJoHUQKvlc05vSAY131gCqa3UXSY2hd3jhfGArEKMMrracUwFSFbh-FeP-3P2nVxSBS3gHrgACA5LI67~~d~jrSRO68xUTyWZBJ~QsqnMdxm4QtAE-NZSkFrJ4BXVscI1tI7dJftLeo6L31lK5HVJhp14UhPJ3g1sJjg59Gvab2HlzEBLDjiXHs0-bAncvKGWnhuvKYyhAQpcwACEji4DatbeOapLvmXwbHGNMCA3F6alMs-WWMJj6dxOFsWnYyx5BgKFZOKBM6fHGBOU~ktou-5thDg8z~9gDrdtix2jz39kHeUABE2Blf9t8JT5tOHpEcwBQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="121709662"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/121709662/INTELLIGENT_COGNITIVE_ENGINE_FOR_5G_NETWORK_QUALITY_OF_SERVICE_MANAGEMENT"><img alt="Research paper thumbnail of INTELLIGENT COGNITIVE ENGINE FOR 5G NETWORK QUALITY OF SERVICE MANAGEMENT" class="work-thumbnail" src="https://attachments.academia-assets.com/116525962/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/121709662/INTELLIGENT_COGNITIVE_ENGINE_FOR_5G_NETWORK_QUALITY_OF_SERVICE_MANAGEMENT">INTELLIGENT COGNITIVE ENGINE FOR 5G NETWORK QUALITY OF SERVICE MANAGEMENT</a></div><div class="wp-workCard_item"><span>International Journal of Wireless & Mobile Networks (IJWMN)</span><span>, 2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">5G-New scenario transparency in communication between various types of networks that are intercon...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">5G-New scenario transparency in communication between various types of networks that are interconnected is expected in radio multimedia. A prevalent issue across all these diverse platforms is the equitable distribution of the restricted network resource among rival apps. A transcendent measure of how equitably properties are distributed to end-users is called Quality of Service (QoS). It is derived from subscriber satisfaction levels and depends on how quickly the network responds to possible infractions of established regulatory guidelines. There are discussion on the perspective of 5G network trust in terms of QoS management, demand formulation, xMBB, M-MTC, and U-MTC. There is a proposed architecture that controls access in the 5G network's data plane. A new cognitive engine for artificial intelligence that is built on memory is put forth. The idea is to translate the probabilistic sign of a set of variables related to resource distribution to the end-user for multi-service improvement.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="5525ea67b625861c773a444594f87158" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":116525962,"asset_id":121709662,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/116525962/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="121709662"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="121709662"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 121709662; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=121709662]").text(description); $(".js-view-count[data-work-id=121709662]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 121709662; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='121709662']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "5525ea67b625861c773a444594f87158" } } $('.js-work-strip[data-work-id=121709662]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":121709662,"title":"INTELLIGENT COGNITIVE ENGINE FOR 5G NETWORK QUALITY OF SERVICE MANAGEMENT","internal_url":"https://www.academia.edu/121709662/INTELLIGENT_COGNITIVE_ENGINE_FOR_5G_NETWORK_QUALITY_OF_SERVICE_MANAGEMENT","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":116525962,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/116525962/thumbnails/1.jpg","file_name":"INTELLIGENTCOGNITIVE_ENGINE_FOR_5G_QUALITY_OF_SERVICE_MANAGEMENT.pdf","download_url":"https://www.academia.edu/attachments/116525962/download_file","bulk_download_file_name":"INTELLIGENT_COGNITIVE_ENGINE_FOR_5G_NETW.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/116525962/INTELLIGENTCOGNITIVE_ENGINE_FOR_5G_QUALITY_OF_SERVICE_MANAGEMENT-libre.pdf?1719914941=\u0026response-content-disposition=attachment%3B+filename%3DINTELLIGENT_COGNITIVE_ENGINE_FOR_5G_NETW.pdf\u0026Expires=1740485480\u0026Signature=R9E2I5hzB~AFng3Q2O5~xxeuVNDAv-17Vi2AGDKXQECkxPHNLhKAPlIgAZXdf1nRnA0s7~6Dq7XcUJYZCf8eyZPr8MURzSxKAW8MHtWhGgnc0GUE7pXDFn0J4t9duIRG2gPm~p0oeB1oFWLCYiYCZDJ-QBN3A6RfPBYbdrD~nIevJlRqBi1lmDM3iZYeojnCDAQAUvoJFEH69rJc3J-o20H6xoCt57Oh-tsiQTgGmOBLuL7~7oZPPp4KieeujIfooJfp3ILZs1Qg6OCigRt0tQoRENVwNqFuuRRpnL2UWfnKAdiIdC2Y64~3xxZuSqhVMbmwvrBMEAC5C3pn6Sazdg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="115060231"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/115060231/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift"><img alt="Research paper thumbnail of Technology Advancement and University Education in Nigeria: History, Trade Unionism and Pattern-Shift" class="work-thumbnail" src="https://attachments.academia-assets.com/111578790/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/115060231/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift">Technology Advancement and University Education in Nigeria: History, Trade Unionism and Pattern-Shift</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="f97fe461e882c29a50f0a245be8643d2" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":111578790,"asset_id":115060231,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/111578790/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="115060231"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="115060231"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 115060231; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=115060231]").text(description); $(".js-view-count[data-work-id=115060231]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 115060231; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='115060231']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "f97fe461e882c29a50f0a245be8643d2" } } $('.js-work-strip[data-work-id=115060231]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":115060231,"title":"Technology Advancement and University Education in Nigeria: History, Trade Unionism and Pattern-Shift","internal_url":"https://www.academia.edu/115060231/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":111578790,"title":"","file_type":"docx","scribd_thumbnail_url":"https://attachments.academia-assets.com/111578790/thumbnails/1.jpg","file_name":"Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift.docx","download_url":"https://www.academia.edu/attachments/111578790/download_file","bulk_download_file_name":"Technology_Advancement_and_University_Ed.docx","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/111578790/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift.docx?1708258272=\u0026response-content-disposition=attachment%3B+filename%3DTechnology_Advancement_and_University_Ed.docx\u0026Expires=1740485480\u0026Signature=AXIaQ1SBFNSA3I8DRm4esYIIr6MBOBV5nyjZBb8qHucCwVc-opZ4bXpcEmKkYimlNYhZyGF2JoeXav4rgvntmSURcoUUdFcXqDxcANLAW20BaM2BgxVMS5tsGN76FKIAR7L6Xrpi3b5wiHKAFJR-ZQtwQzgfnS-CiTYuGNVP4EqJBdTNBKmO9ThUN6izirqIVtyUP1CXYO2VUoEzfC~OjEXwD62~EUVB7a4EVCswE0Egmuc33fZmfGmxNHHhepb9Leqym2X6OXQn8Sji6WB0xwS0kTkUpg40-Hw5GKamX9ivIChLXtbw~0XqTwkt3N1agDGGDELz4zYAl90DG2-ueA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="112212431"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/112212431/Implementation_of_the_Geographic_Information_Systems_GISs_using_Object_Oriented_Programming_Methods"><img alt="Research paper thumbnail of Implementation of the Geographic Information Systems (GISs) using Object-Oriented Programming Methods" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/112212431/Implementation_of_the_Geographic_Information_Systems_GISs_using_Object_Oriented_Programming_Methods">Implementation of the Geographic Information Systems (GISs) using Object-Oriented Programming Methods</a></div><div class="wp-workCard_item"><span>Academia letters</span><span>, Aug 27, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Geographic Information Systems (GISs) are computer-based systems for the analysis, display, and r...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Geographic Information Systems (GISs) are computer-based systems for the analysis, display, and retrieval of spatial data which directly or indirectly illustrates a particular geographical area or location. The improvement in the exploit and complexity of GIS systems has created some research awareness which has contributed to a dynamic and expanding academic society using objects, associations, and generalizations. Object-Oriented Programming has ensured ease in the creation of GIS systems with apparent understanding and applications.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="112212431"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="112212431"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 112212431; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=112212431]").text(description); $(".js-view-count[data-work-id=112212431]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 112212431; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='112212431']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=112212431]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":112212431,"title":"Implementation of the Geographic Information Systems (GISs) using Object-Oriented Programming Methods","internal_url":"https://www.academia.edu/112212431/Implementation_of_the_Geographic_Information_Systems_GISs_using_Object_Oriented_Programming_Methods","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="112212430"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/112212430/Application_of_Object_Oriented_Analysis_and_Design_Methodology_in_modeling_of_University_Administrative_Information_System"><img alt="Research paper thumbnail of Application of Object-Oriented Analysis and Design Methodology in modeling of University Administrative Information System" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/112212430/Application_of_Object_Oriented_Analysis_and_Design_Methodology_in_modeling_of_University_Administrative_Information_System">Application of Object-Oriented Analysis and Design Methodology in modeling of University Administrative Information System</a></div><div class="wp-workCard_item"><span>Academia letters</span><span>, Nov 2, 2021</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="112212430"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="112212430"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 112212430; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=112212430]").text(description); $(".js-view-count[data-work-id=112212430]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 112212430; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='112212430']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=112212430]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":112212430,"title":"Application of Object-Oriented Analysis and Design Methodology in modeling of University Administrative Information System","internal_url":"https://www.academia.edu/112212430/Application_of_Object_Oriented_Analysis_and_Design_Methodology_in_modeling_of_University_Administrative_Information_System","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","email":"K0tqbnI1T0trT05VZ0dnV1BnRGVya1R0YncycFd6anJOQlhyZUJwenEyZjhMQzhsVSszSnlvT3J1bmJ6ZndlSy0tdlBwYUNxaXF1QS9udVhWY0prOUZpdz09--ba5981a7bde88e0ebc6433d5893495479fa4fc00"},"attachments":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="112212412"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/112212412/Object_Oriented_Programming_and_Software_Development_Paradigm"><img alt="Research paper thumbnail of Object-Oriented Programming and Software Development Paradigm" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/112212412/Object_Oriented_Programming_and_Software_Development_Paradigm">Object-Oriented Programming and Software Development Paradigm</a></div><div class="wp-workCard_item"><span>Academia letters</span><span>, Sep 20, 2021</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="112212412"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="112212412"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 112212412; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=112212412]").text(description); $(".js-view-count[data-work-id=112212412]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 112212412; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='112212412']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=112212412]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":112212412,"title":"Object-Oriented Programming and Software Development Paradigm","internal_url":"https://www.academia.edu/112212412/Object_Oriented_Programming_and_Software_Development_Paradigm","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","email":"MjBjNGRJdUVKNS9yWHRzTXVQR0plMjdWSkVrTlJmL2xZNnR2S0lTV0tTZE1VZlRDK3ZqZUF0dm9kMWFOQlZwTi0tM1Z5U1dOaUNMc1NJYlBIWlRoTkdhQT09--88c174725145034c416bb8c63fdf09b08c4bb030"},"attachments":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="76173630"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/76173630/Application_of_Object_Oriented_Analysis_and_Design_Methodology_in_modeling_of_University_Administrative_Information_System"><img alt="Research paper thumbnail of Application of Object-Oriented Analysis and Design Methodology in modeling of University Administrative Information System" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/76173630/Application_of_Object_Oriented_Analysis_and_Design_Methodology_in_modeling_of_University_Administrative_Information_System">Application of Object-Oriented Analysis and Design Methodology in modeling of University Administrative Information System</a></div><div class="wp-workCard_item"><span>Academia Letters</span><span>, 2021</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="76173630"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="76173630"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 76173630; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=76173630]").text(description); $(".js-view-count[data-work-id=76173630]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 76173630; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='76173630']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=76173630]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":76173630,"title":"Application of Object-Oriented Analysis and Design Methodology in modeling of University Administrative Information System","internal_url":"https://www.academia.edu/76173630/Application_of_Object_Oriented_Analysis_and_Design_Methodology_in_modeling_of_University_Administrative_Information_System","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","email":"UnYyYUJBNUJQcW5WbGpuQXkzNGdiZUlqK29RRndsN0lqS0cvbzUyMmlGSXVsQkVsY0tqNkhRREFZdEJGbHRHLy0tOXVkMnBHVU1sM01EQzh4MXFQN28rdz09--d300056c91bed5085e509236bd823545d6c1b903"},"attachments":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="76173601"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/76173601/Object_Oriented_Programming_and_Software_Development_Paradigm"><img alt="Research paper thumbnail of Object-Oriented Programming and Software Development Paradigm" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/76173601/Object_Oriented_Programming_and_Software_Development_Paradigm">Object-Oriented Programming and Software Development Paradigm</a></div><div class="wp-workCard_item"><span>Academia Letters</span><span>, 2021</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="76173601"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="76173601"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 76173601; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=76173601]").text(description); $(".js-view-count[data-work-id=76173601]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 76173601; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='76173601']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=76173601]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":76173601,"title":"Object-Oriented Programming and Software Development Paradigm","internal_url":"https://www.academia.edu/76173601/Object_Oriented_Programming_and_Software_Development_Paradigm","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","email":"QjRMZDVIRy9JMklCend1bkIwTFFoL2lsQ0pPeUgzMy95cCt4cTVzOGdEV2YyRmJkbUkrYUZsYkV3b1J1UWp5OS0tQXFXTHFHNXRWcHFzRkhsZFRwMUJydz09--a8fa91b87c63d651f34c53ea0ed47bae6e817b35"},"attachments":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="63319249"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/63319249/Implementation_of_the_Geographic_Information_Systems_GISs_using_Object_Oriented_Programming_Methods"><img alt="Research paper thumbnail of Implementation of the Geographic Information Systems (GISs) using Object-Oriented Programming Methods" class="work-thumbnail" src="https://attachments.academia-assets.com/76044865/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/63319249/Implementation_of_the_Geographic_Information_Systems_GISs_using_Object_Oriented_Programming_Methods">Implementation of the Geographic Information Systems (GISs) using Object-Oriented Programming Methods</a></div><div class="wp-workCard_item"><span>Academia Letters</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Geographic Information Systems (GISs) are computer-based systems for the analysis, display, and r...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Geographic Information Systems (GISs) are computer-based systems for the analysis, display,<br />and retrieval of spatial data which directly or indirectly illustrates a particular geographical<br />area or location. The improvement in the exploit and complexity of GIS systems has created<br />some research awareness which has contributed to a dynamic and expanding academic society<br />using objects, associations, and generalizations. Object-Oriented Programming has ensured<br />ease in the creation of GIS systems with apparent understanding and applications.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="3a80093be1486299d2e172dacf181cd8" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":76044865,"asset_id":63319249,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/76044865/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="63319249"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="63319249"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 63319249; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=63319249]").text(description); $(".js-view-count[data-work-id=63319249]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 63319249; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='63319249']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "3a80093be1486299d2e172dacf181cd8" } } $('.js-work-strip[data-work-id=63319249]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":63319249,"title":"Implementation of the Geographic Information Systems (GISs) using Object-Oriented Programming Methods","internal_url":"https://www.academia.edu/63319249/Implementation_of_the_Geographic_Information_Systems_GISs_using_Object_Oriented_Programming_Methods","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":76044865,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/76044865/thumbnails/1.jpg","file_name":"Implementation_of_the_Geographic_Information_Systems.pdf","download_url":"https://www.academia.edu/attachments/76044865/download_file","bulk_download_file_name":"Implementation_of_the_Geographic_Informa.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/76044865/Implementation_of_the_Geographic_Information_Systems-libre.pdf?1639120909=\u0026response-content-disposition=attachment%3B+filename%3DImplementation_of_the_Geographic_Informa.pdf\u0026Expires=1740485480\u0026Signature=XZEIlB~5jxaAc07TSFDG6HVLzWE7GKNpbwS-IKqImRUplg2OKcF6~qevgV6vtD666b7r-~-DDnliTuXAWAZrywKdsYxoIyV8rS0Q3SFdMx69-hLffGo9-3wN-9RUAmDRRZ53vgEZiWAtX6u2b7zEf5M7MaDKU9qs~sDLRyHQNT5bZPf801kq-QYB2kz71S5bubzhYNN0FrI3ke-3lqWRLmXrorwi6JKo1dASTTE2FVx37PLrikWKvKQUClJJgM5b0i8tYmsEjmYiJsgO34W~Qjv7F602UNN-YIjoFklCKWdfxWTJePDEO2E-f10Eo66S6gs6ro5PU3MX6CpxElabvA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="60835266"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/60835266/Application_of_Object_Oriented_Analysis_and_Design_Methodology_in_modeling_of_University_Administrative_Information_System"><img alt="Research paper thumbnail of Application of Object-Oriented Analysis and Design Methodology in modeling of University Administrative Information System" class="work-thumbnail" src="https://attachments.academia-assets.com/74256400/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/60835266/Application_of_Object_Oriented_Analysis_and_Design_Methodology_in_modeling_of_University_Administrative_Information_System">Application of Object-Oriented Analysis and Design Methodology in modeling of University Administrative Information System</a></div><div class="wp-workCard_item"><span>Academia Letters</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">There is an urgent need for a pattern shift in the manual ways that the university administration...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">There is an urgent need for a pattern shift in the manual ways that the university administration conducts some of its operations due to the inherent errors. There is a need to change from the paper-based appraisal processes, leave request application, course allocation, task and responsibility delegation, monthly returns, trails in the wages and salary, instant payslip delivery, medical diagnosis and prescriptions, loan request and approval, staff movement, transcript request and approval, students management system, promotion, resignation, and etcetera. For this reason, there is the desire for modeling the university administrative information system by using Object-Oriented Analysis and Design (OOAD) Methodology. The outcomes are numerous, day-today activities with regards to the university operations can be carried out electronically with the assistance of the Unified Modeling Languages (UML). The new system will assist in most of the university operations by eliminating inefficiency and reducing TurnAround Time (TAT) from the Standard Operating Procedures (SOP) in the Nigerian Universities.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="b39c4416ef20c14a2680eca72f33ef5b" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":74256400,"asset_id":60835266,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/74256400/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="60835266"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="60835266"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 60835266; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=60835266]").text(description); $(".js-view-count[data-work-id=60835266]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 60835266; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='60835266']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "b39c4416ef20c14a2680eca72f33ef5b" } } $('.js-work-strip[data-work-id=60835266]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":60835266,"title":"Application of Object-Oriented Analysis and Design Methodology in modeling of University Administrative Information System","internal_url":"https://www.academia.edu/60835266/Application_of_Object_Oriented_Analysis_and_Design_Methodology_in_modeling_of_University_Administrative_Information_System","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":74256400,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/74256400/thumbnails/1.jpg","file_name":"letter20211106-15642-129at14.pdf","download_url":"https://www.academia.edu/attachments/74256400/download_file","bulk_download_file_name":"Application_of_Object_Oriented_Analysis.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/74256400/letter20211106-15642-129at14-libre.pdf?1636191933=\u0026response-content-disposition=attachment%3B+filename%3DApplication_of_Object_Oriented_Analysis.pdf\u0026Expires=1740485480\u0026Signature=KQ0uWrGDIzqI1g-EeMNYS6uIm0vgwl1qrq9VL-oEZqLkOIwZShus4zSn4djxUyfnpjoApxUf~aU6PBDOUzfOJsDwO6fZO3uExXdnb2gU3SfyR4K3y9qd-U7V-fAYJldZ7xOG2YBOZYBNazCeu41HrkdeSqShiDD5oZ4u4eH3hOYW2LYBcQLLqySJfJMOf7RsywCPiCucmZ~ea79gju9lPjDrkanWh2xcDVMIKg92Z4nbHBWP6dvhcGAh1NXdS7PxIUw-G6WBSJwqXD1phm25y4zDQhWS0YfZh4h47y2kiULXyUZnDIt-szaK9kvhQT-cNlYE8scraRs~I1eUgxzAUQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="53051223"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/53051223/Object_Oriented_Programming_and_Software_Development_Paradigm"><img alt="Research paper thumbnail of Object-Oriented Programming and Software Development Paradigm" class="work-thumbnail" src="https://attachments.academia-assets.com/70211541/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/53051223/Object_Oriented_Programming_and_Software_Development_Paradigm">Object-Oriented Programming and Software Development Paradigm</a></div><div class="wp-workCard_item"><span>Academia Letters</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Object-Oriented Programming (OOP) Software Development Paradigm, birthed some few decades ago wit...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Object-Oriented Programming (OOP) Software Development Paradigm, birthed some few decades ago with provisions for a varied understanding of programming languages than the primordial procedural programming parlance in software development (FORTRAN, Pascal, C, and etcetera). The OOP ab-initio didn't provide some resounding assurances and attractively structured codes to the users without the use of "goto" provisions. OOP at this point has attained some feet as excellent programming practices are now guaranteed and be defined. OOP is attributed as a methodology or a tactic that focused on such ways objects work together to express data sharing. It has changed the procedural conception of programming where vast attention is saddled on procedures and logic. There are seven essential concepts in Object-Oriented Programming (OOP) Software Development. The first is an Object. An Object is an encapsulated entity that provides sets of predetermined services at a given period. It is also looked upon as anything that has existence and with some value. Subsequently is Class; a class is the main body of a system. It creates the federating units of a system. We also have Generalization, Inheritance, Abstraction, Polymorphism, and Encapsulation. Not all programmers believe that OOP is a methodology.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="85cfde6bd39c3a44734637b682ed89a7" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":70211541,"asset_id":53051223,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/70211541/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="53051223"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="53051223"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 53051223; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=53051223]").text(description); $(".js-view-count[data-work-id=53051223]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 53051223; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='53051223']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "85cfde6bd39c3a44734637b682ed89a7" } } $('.js-work-strip[data-work-id=53051223]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":53051223,"title":"Object-Oriented Programming and Software Development Paradigm","internal_url":"https://www.academia.edu/53051223/Object_Oriented_Programming_and_Software_Development_Paradigm","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":70211541,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/70211541/thumbnails/1.jpg","file_name":"letter20210925-13393-gdhnki.pdf","download_url":"https://www.academia.edu/attachments/70211541/download_file","bulk_download_file_name":"Object_Oriented_Programming_and_Software.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/70211541/letter20210925-13393-gdhnki-libre.pdf?1632559909=\u0026response-content-disposition=attachment%3B+filename%3DObject_Oriented_Programming_and_Software.pdf\u0026Expires=1740485480\u0026Signature=C0hZAGDsOTGi9~N3G8n~gOGDSk7xAlCIwrqFYZaxwmyczOnzSeiAB9DIrHoW9vSeQsUOAUURe48UOy-zc9c-d4qbbjn4ilhoqMS-D3OS5FkrS9XpXEfHvIXLrPrNbs9eoajoZyjy2YTE4g1EVL13GrVHulDT~nR2~ASTHaqDEmyN8e7ucAaHKnzVe8Fm3jnHCQyTX1e-wPRwCrVkYk6aJ0NTEuK5hGRtNnFyTwyWeN7LvPNk9QiYRqXvSNFPA~fVw1a92tr2n6N1DxoJaZR9gGIRLgQ35l5DdK~YDdR4DPgQT9sq3eoHSqoG5ChwGGhbeSGzRMUvbVjSWj9bl0AN3A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="9332785" id="papers"><div class="js-work-strip profile--work_container" data-work-id="127096915"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/127096915/Investigating_the_Impact_of_AI_ML_for_Monitoring_and_Optimizing_Energy_Usage_in_Smart_Homes"><img alt="Research paper thumbnail of Investigating the Impact of AI/ML for Monitoring and Optimizing Energy Usage in Smart Homes" class="work-thumbnail" src="https://attachments.academia-assets.com/120880961/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/127096915/Investigating_the_Impact_of_AI_ML_for_Monitoring_and_Optimizing_Energy_Usage_in_Smart_Homes">Investigating the Impact of AI/ML for Monitoring and Optimizing Energy Usage in Smart Homes</a></div><div class="wp-workCard_item"><span>Universal Wiser Publisher</span><span>, 2025</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Integrating artificial intelligence (AI) and machine learning (ML) into smart home systems has si...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Integrating artificial intelligence (AI) and machine learning (ML) into smart home systems has significantly advanced and improved residential energy efficiency, addressing growing concerns around energy conservation and sustainability. Choosing appropriate AI/ML techniques to optimize energy consumption in the dynamic and contemporary smart home environment remains a complex challenge. This study investigates a range of AI/ML algorithms such as regression models, deep learning, clustering, and decision trees to enhance energy management in smart homes. The study highlights the core processes of smart home energy optimization, including data acquisition, feature extraction, and model evaluation, as well as the specific roles of each AI/ML technique in optimizing energy usage. The study also discusses the strengths and weaknesses of the AI/ML techniques used for smart homes. It further explores the application areas and emerging challenges such as data security risks, high implementation costs, and gaps in existing technology that impact the scalability of AI/ML solutions in smart home contexts. The findings reveal that AI/ML techniques can effectively transform energy management in smart homes, enabling real-time optimization and adaptive decision-making to minimize energy consumption and reduce costs. Additionally, the study highlights future research directions.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="56091f9df56dab98db5cd94d7337f65a" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":120880961,"asset_id":127096915,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/120880961/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="127096915"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="127096915"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 127096915; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=127096915]").text(description); $(".js-view-count[data-work-id=127096915]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 127096915; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='127096915']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "56091f9df56dab98db5cd94d7337f65a" } } $('.js-work-strip[data-work-id=127096915]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":127096915,"title":"Investigating the Impact of AI/ML for Monitoring and Optimizing Energy Usage in Smart Homes","internal_url":"https://www.academia.edu/127096915/Investigating_the_Impact_of_AI_ML_for_Monitoring_and_Optimizing_Energy_Usage_in_Smart_Homes","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":120880961,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/120880961/thumbnails/1.jpg","file_name":"Investigating_the_Impact_of_AI_ML_for_Monitoring_and_Optimizing_Energy.pdf","download_url":"https://www.academia.edu/attachments/120880961/download_file","bulk_download_file_name":"Investigating_the_Impact_of_AI_ML_for_Mo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/120880961/Investigating_the_Impact_of_AI_ML_for_Monitoring_and_Optimizing_Energy-libre.pdf?1737178253=\u0026response-content-disposition=attachment%3B+filename%3DInvestigating_the_Impact_of_AI_ML_for_Mo.pdf\u0026Expires=1740485480\u0026Signature=RrYxPFQ6SwlUBLxiDgJR94nVhOQgT4A61cozUzCt1CthnPDCV2phhtXKLEATPdXtazZLKPoj1NbBvDRfj~FbzyZLHF9VY4xLqu5coRQYOOeVw5~thBJy-hblkaNPTzlTsfvvtQBfGhFZkBOX3LrMePrV0S79mK99qhWOqtySkEa7BTEGFP4Vb2JQrIUhE~39qNFWaD6kqlgkn6Tzk-tJlGw2Qyn4KYKdq0TK9jxzOMqQnSfilF5grwyGWW4DwdJCXgxFJh3yC0Y7JE0S1q2KcfzPOSbwZTsuVjtyR7ut-S8XH9iTn2sA1eeGBhu8qnrHGwASIUaHUiDSfpDYLpXbiA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="124384378"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/124384378/CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_THE_IOT_DEVICES"><img alt="Research paper thumbnail of CYBER ATTACK DETECTION AND DEFENSE FOR THE IOT DEVICES" class="work-thumbnail" src="https://attachments.academia-assets.com/118620572/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/124384378/CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_THE_IOT_DEVICES">CYBER ATTACK DETECTION AND DEFENSE FOR THE IOT DEVICES</a></div><div class="wp-workCard_item"><span>International Research Journal of Modernization in Engineering Technology and Science (IRJMET)</span><span>, 2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">As more and more Internet of Things (IoT) devices are included into Cyber-Physical Systems (CPS),...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">As more and more Internet of Things (IoT) devices are included into Cyber-Physical Systems (CPS), it is critical to maintain the security of these networked systems. This work focuses on using Support Vector Machine (SVM) models to create and deploy a cyber attack detection system for IoT-based CPS. The SVM model is trained on historical data to discern between normal and harmful behavior patterns displayed by IoT devices within the CPS. The SVM model is well-known for its efficacy in binary classification tasks. Through training to understand the system's typical behavior, the SVM model gains the ability to recognize variations that could be signs of a cyber-attack. Simulations and real-world tests show how well the SVM-based detection system works to identify different kinds of cyber-threats. This study does, however, admit several shortcomings. The dynamic and changing nature of cyber threats may have an effect on the SVM model's performance because it mostly depends on previous data for training and detection accuracy problems. In this study work, a novel CNN model based on deep learning was proposed in order to overcome the shortcomings of the current cyber threat detection model. The suggested model enhances performance metrics and the detection of cyber-attacks. When compared to the existing model, the new model performs better. The f1-score, accuracy, precision, and recall metrics are used to gauge performance.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="70ede752e4943557e0260be9dfb31245" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":118620572,"asset_id":124384378,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/118620572/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="124384378"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="124384378"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 124384378; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=124384378]").text(description); $(".js-view-count[data-work-id=124384378]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 124384378; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='124384378']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "70ede752e4943557e0260be9dfb31245" } } $('.js-work-strip[data-work-id=124384378]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":124384378,"title":"CYBER ATTACK DETECTION AND DEFENSE FOR THE IOT DEVICES","internal_url":"https://www.academia.edu/124384378/CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_THE_IOT_DEVICES","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","email":"YktBRit0cWllTkU3UXdVOGhrZy80Z3I4aGs2RFN2cXNvaExMV04vUUVUZ3d2NzM5UjdUWTI1cGl2WDlxZTQ1di0tNTdQOGFJUjV3ZVNLamlvMEtya2QyUT09--52042ed666585e2cd5c2b0c13c64a6d0b5ebbbc3"},"attachments":[{"id":118620572,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/118620572/thumbnails/1.jpg","file_name":"CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_THE_IOT_DEVICES.pdf","download_url":"https://www.academia.edu/attachments/118620572/download_file","bulk_download_file_name":"CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_T.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/118620572/CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_THE_IOT_DEVICES-libre.pdf?1727955930=\u0026response-content-disposition=attachment%3B+filename%3DCYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_T.pdf\u0026Expires=1740381753\u0026Signature=TQh-wGPV8uiUBhHk6pEDfpo~4246mrIv4QDoiXuHkG2zkOiEmfdJZQLaNtAad0x9-HhQdEiLiZ~URAF7F8EFwAuf1UNW~dWDbbrqGc5OZARhvHFxWrfpt0m55fEyGe5oaJEVaQU8GXhkZ9fdkXXhZyhjJpKvJKM-gQfPMIMtS0cH4CeDtzV2I6OTymqZ3vBKr9Rk0lg9ozbhNv7mSQPQMnMHhCwK5U0FXx0ni5niz5MOKQ32kOoDm9iDeqrHY2Iq7cvnFUML~Ey2DXmTnc-teWCi8BJnGAHxsL18Gp886y6exFoZPK9fiywK9yjAeDUwqZteWRvkE8LRCGtHEHOnVw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":118620594,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/118620594/thumbnails/1.jpg","file_name":"CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_THE_IOT_DEVICES.pdf","download_url":"https://www.academia.edu/attachments/118620594/download_file","bulk_download_file_name":"CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_T.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/118620594/CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_THE_IOT_DEVICES-libre.pdf?1727968179=\u0026response-content-disposition=attachment%3B+filename%3DCYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_T.pdf\u0026Expires=1740381753\u0026Signature=Qj8jgXTb~~K2CIuiMO7Nezlp7qFqQEu2JVQDpICkj2iW66RN7z4rW0Cc9LudLzyXw1kFEfPmpeTECXsmqfEtPspernbbKxTPOfx8OW0YnOwKFSBsE8i0lRTg2FylrpfRoAsG7xGBCLx1qfHzI06nQSKoBS56OxA1JuUt2RzD1bxEJk-iMyHvwB-J7iTcM1hHMp1sZB-310oEqaJTV91jOcmWhplqhGfoB~8V~Q05TyRk9tDBd9OLhVZ2vo~0UJuXaUErw~Fg3WVpnM-k8pzAgZ4MdxWQRW7w2ZRxneWliTEc~ifcS~fVJCG77QvLDCyArykoxpZ-3M4W91KSAF3Qwg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":118620409,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/118620409/thumbnails/1.jpg","file_name":"CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_THE_IOT_DEVICES.pdf","download_url":"https://www.academia.edu/attachments/118620409/download_file","bulk_download_file_name":"CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_T.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/118620409/CYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_THE_IOT_DEVICES-libre.pdf?1727955990=\u0026response-content-disposition=attachment%3B+filename%3DCYBER_ATTACK_DETECTION_AND_DEFENSE_FOR_T.pdf\u0026Expires=1740381753\u0026Signature=gjsmg3MeiUOJUa7r7p-5AY5Q7ErM2sq2rpPgHfecMvUKG1fD943MrWCjIaJg5~ErBpADyHzNCd2pf1t8j5FHdyAAU3jhwetv0l1njCovW-wV-lpQn2FUctdh1qLqM3HSq4c9YHX6koajdF6nQQx5fSGPLIrBT7Z0y~bvZerAM4jQiHC76Xxy3XNjGNhgd-7QXesnu-8CNu8d77gBVE0ILccTZ5U0MLwCJb6RMPveHj6DZD1LxUH9t3zyb1jZVFmi2AzOQiFE7h3kArG546yek34EgQweoL8Mv0lS-Hti4I2SGlnCdvNLpx4-E0~dkgMhWICwTJ~-M7ACFgaY-FMJgQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="124298533"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/124298533/Cyber_Security_Improvements_and_Vulnerability_Management_in_Digital_Settings"><img alt="Research paper thumbnail of Cyber Security Improvements and Vulnerability Management in Digital Settings" class="work-thumbnail" src="https://attachments.academia-assets.com/118550877/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/124298533/Cyber_Security_Improvements_and_Vulnerability_Management_in_Digital_Settings">Cyber Security Improvements and Vulnerability Management in Digital Settings</a></div><div class="wp-workCard_item"><span>Cyber Security Improvements and Vulnerability Management in Digital Settings</span><span>, 2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The goal of this study was to provide a thorough framework that would increase vulnerability mana...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The goal of this study was to provide a thorough framework that would increase vulnerability management and cyber security in a digital setting. The research examined the difficulties in managing vulnerabilities in digital settings, concentrating on cyber-physical power systems (CPPS). Existing Cyber Security frameworks such as NIST, ISO 27001, and ISA/IEC 62443 were assessed for their application to CPPS through a thorough analysis of the literature. Important weaknesses and attack avenues specific to CPPS's integration of information and operational technology were found. It was investigated how artificial intelligence (AI) might both strengthen cyber security defenses and make more complex AI-driven attacks possible. It was noted that there are shortcomings in the present frameworks, namely the absence of standardized AI integration and real-time threat detection capabilities. The study combined its findings to suggest a holistic framework that fills in these gaps, including techniques to successfully manage new cyber dangers and guidance for using AI in a secure manner. The report suggested creating AI-specific security guidelines, encouraging multidisciplinary cooperation, and making sure framework changes are made on a regular basis to keep up with the changing world of cyber-threats. The goal of this research was to increase vital digital infrastructures' resilience to cyber-attacks.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="479d2586f935dd558368d07af96c1df6" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":118550877,"asset_id":124298533,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/118550877/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="124298533"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="124298533"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 124298533; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=124298533]").text(description); $(".js-view-count[data-work-id=124298533]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 124298533; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='124298533']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "479d2586f935dd558368d07af96c1df6" } } $('.js-work-strip[data-work-id=124298533]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":124298533,"title":"Cyber Security Improvements and Vulnerability Management in Digital\r\nSettings","internal_url":"https://www.academia.edu/124298533/Cyber_Security_Improvements_and_Vulnerability_Management_in_Digital_Settings","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","email":"WmNEb3JRbm5sOWJmQjlNSjRxTEJmV09PTHo5b0I1VzlsOHl4TDhxRFZ6R2FlVW1uZTJTbUV3ZGhXd00zWnlFTC0tL3NBMklqTjJMUWc1MmVnOENCMVhJdz09--e60efbf119f82ab8d08d3431f99440cc5f806d76"},"attachments":[{"id":118550877,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/118550877/thumbnails/1.jpg","file_name":"Cyber_Security_Improvements_and_Vulnerability_Management_in_Digital_Settings.pdf","download_url":"https://www.academia.edu/attachments/118550877/download_file","bulk_download_file_name":"Cyber_Security_Improvements_and_Vulnerab.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/118550877/Cyber_Security_Improvements_and_Vulnerability_Management_in_Digital_Settings-libre.pdf?1727725650=\u0026response-content-disposition=attachment%3B+filename%3DCyber_Security_Improvements_and_Vulnerab.pdf\u0026Expires=1740381753\u0026Signature=gO1ZO4K1~06OIRoUnpzRplA4he2P6FldzQ776aE~NjoV-~TkyuHtLb-x2qsebgMrQ9iszhewsOcYimD95CT8lA~-oxlsNhKObv-WpMTEOfFx8tUjxNLAZwJ6xG9-ITrDEsymvGvo3LuEUOAg6VABCFMZrzjxHtM9cHZ1XQe8SS8HPa3prUcx0M-~b~7jhIYmDQ~WI6CkOXCYM3Fr2rqG5ydhI6TWcqibPXv2XQT516yE3LFa3x~ENWzhlgFzLiOiYk~3eOAx1IP2u0uNFNUiuc-t5kwwPUu~G-D9kTz9OLHOQ-xdMceKZVCKhBpwSpEydZ9aoKQ90NqvQbI2UAlMwg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":118550769,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/118550769/thumbnails/1.jpg","file_name":"Cyber_Security_Improvements_and_Vulnerability_Management_in_Digital_Settings.pdf","download_url":"https://www.academia.edu/attachments/118550769/download_file","bulk_download_file_name":"Cyber_Security_Improvements_and_Vulnerab.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/118550769/Cyber_Security_Improvements_and_Vulnerability_Management_in_Digital_Settings-libre.pdf?1727725678=\u0026response-content-disposition=attachment%3B+filename%3DCyber_Security_Improvements_and_Vulnerab.pdf\u0026Expires=1740381753\u0026Signature=PUjpjv~qG~dQUNZQJNJ1Jq1obRwqFE7cT-Pq8tesUWgoBUglYmBmcVmxk7hS10J-kINBk8Im6Z6uCLucX0sGNtLayhWfIN0Ud-6u-ePprDJXTzJHY6qfq30QrnFQQ85jaSLd8whUwNLKFOMDadbVk8B27M~2xvSNCrMnBqZY4tg8J2mh14t2RgoMC~UYqLLMJeu6dXpEdN8t3~Pn96-VbrdlkESzsbXLidT7yOu0I3HXpcsJUW7J5Gnfah0TekVAdS6dE3a607f27qTuVuzgx202w--dOnjMaOk6P7Gz~AY9N~fkBROMDgGHgU4SGIESM5vj9gz5zFP4uIRU0AdO5g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="124058376"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/124058376/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift"><img alt="Research paper thumbnail of Technology Advancement and University Education in Nigeria: History, Trade Unionism and Pattern-Shift" class="work-thumbnail" src="https://attachments.academia-assets.com/118551141/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/124058376/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift">Technology Advancement and University Education in Nigeria: History, Trade Unionism and Pattern-Shift</a></div><div class="wp-workCard_item"><span>INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN TECHNOLOGY (IJIRT)</span><span>, 2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">University education is currently the climax of the educational learning processes in Nigeria. It...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">University education is currently the climax of the educational learning processes in Nigeria. It is an imperative and most critical part of human development given to the fact that it is a base for high-level skills acquirement and an essential qualification for the labour market. Universities empower and release graduates who turn to become workforce and are suitable and extremely useful for economic development. The education sector in Nigeria is relatively thriving and somewhat productive to the stakeholders especially during the advent of the fourth republic. In 1999, the Federal Government of Nigeria licensed the public to establish private universities to create room for competition regarding academic standards and infrastructural facilities that will support qualitative education for the people.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="4660cd87f7a24f6c69453f5c42a78880" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":118551141,"asset_id":124058376,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/118551141/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="124058376"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="124058376"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 124058376; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=124058376]").text(description); $(".js-view-count[data-work-id=124058376]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 124058376; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='124058376']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "4660cd87f7a24f6c69453f5c42a78880" } } $('.js-work-strip[data-work-id=124058376]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":124058376,"title":"Technology Advancement and University Education in Nigeria: History, Trade Unionism and Pattern-Shift","internal_url":"https://www.academia.edu/124058376/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","email":"QzNRV3RFVGIwK0NRYnhFS1FmSkx6d01NUURUWEVyYUlhOWphVWpzZ0N3bkZVdWZodkhTYU9JaEVpSVVGcU5jci0tQ3V5cjJQb0pjMXBQSWRQdlN0T1dmdz09--0089aa363471c451d5ba37849424f7c96ea67b15"},"attachments":[{"id":118551141,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/118551141/thumbnails/1.jpg","file_name":"Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift.pdf","download_url":"https://www.academia.edu/attachments/118551141/download_file","bulk_download_file_name":"Technology_Advancement_and_University_Ed.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/118551141/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift-libre.pdf?1727721437=\u0026response-content-disposition=attachment%3B+filename%3DTechnology_Advancement_and_University_Ed.pdf\u0026Expires=1740381753\u0026Signature=GJki5As0UwexKWcMPpHKlU27kk9OdHTAMRQLMVp7ZtDNdPKl8JjC7xYyylWu9oQpbqntJz1tXA7MbUHoKe~7-6OZakUIU7PPVMTNX3bXbbocVkGCyD3DFt3CVQASK6ET-ELvALUsU~3PrBJ8TQiSPIyJ93RRs2G8h2OM2Ft1ihd6xPxEbOq0LsfzoyTW5VbPSmuGxCKlzB4klASL27FvqJlg4h5DoDUa3wkpA3l36dD39zt9fK5cUumT6xaqonsm3us2j8S05STfyC4kRFA0s6yXhrv6D0BTM-FyKA9od2NpdfjXmz8hFwlWHTdiNbt3ujoGriCyOsxYsIF7dlT12g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":118551127,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/118551127/thumbnails/1.jpg","file_name":"Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift.pdf","download_url":"https://www.academia.edu/attachments/118551127/download_file","bulk_download_file_name":"Technology_Advancement_and_University_Ed.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/118551127/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift-libre.pdf?1727725580=\u0026response-content-disposition=attachment%3B+filename%3DTechnology_Advancement_and_University_Ed.pdf\u0026Expires=1740381753\u0026Signature=Dd3udZOFKnWnwieLIUfBnrVnvv7D7gGzujkykdaem9ZDR9J82eh37HLLtlLLLtg-z2JMfKvE1zebcIbfOdE7qwGmt5FsRovBhfkVhjTBcvImaNU8nX3ol0XLkM2Ot6AJ3QpLBnJ59XcXeBtZfI5Z2FsE7gipRT3TSXnHZHRAhuB77WOioMtHFUMju6MxWsIYzgo62nXRg0UbCNQLeUXe66gpUcervfSHDPOcvePj9tN~bOadAxhw6wZ04XoaFslg9nkIzkrKXRRFfj7nMkvn6QYQGTXSuBwRivVNPorn2XnZ0FH2TFdox23Y1GQBGumpTzownOj9rCRCJeXTrPioyQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":118354086,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/118354086/thumbnails/1.jpg","file_name":"Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift.pdf","download_url":"https://www.academia.edu/attachments/118354086/download_file","bulk_download_file_name":"Technology_Advancement_and_University_Ed.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/118354086/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift-libre.pdf?1726952768=\u0026response-content-disposition=attachment%3B+filename%3DTechnology_Advancement_and_University_Ed.pdf\u0026Expires=1740381753\u0026Signature=eZ1dJylgetdoYiVpupTBpuzf3anSDeQdexr8p4fUEHG3d1LOU0deW~zC6Z0jKGaNALPXzO-ESNsJKC3e2qT9IfHsL9iNpodVdCr6K06oXub1Xfbvf6HfCH9Xdz7ZLRxdYLj56ITLh7dPyZBfjwsjxZ8hT9QqbUxKOP7SwlxsSdUYNm3ETFQMjdRRBzur5FgPQlEjtnAm4Ao3OcjLdhYswg64TouArJxhyrbgw3~wLq-LQ5exHsTR4K-3TODwJDhwdRB2y7zTroEB8y0KTqgZrG85S~WgV9J2Y8aDT62PUGMdBAHHqJL0LuIbR25fnV3-DUPNY3HBHn4gt2oXnX0GHg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="122015374"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/122015374/Phishing_Attacks_Prevention_using_Smart_Based_Artificial_Intelligence_Algorithms_for_Cyber_Security_Awareness"><img alt="Research paper thumbnail of Phishing Attacks Prevention using Smart Based Artificial Intelligence Algorithms for Cyber Security Awareness" class="work-thumbnail" src="https://attachments.academia-assets.com/116763293/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/122015374/Phishing_Attacks_Prevention_using_Smart_Based_Artificial_Intelligence_Algorithms_for_Cyber_Security_Awareness">Phishing Attacks Prevention using Smart Based Artificial Intelligence Algorithms for Cyber Security Awareness</a></div><div class="wp-workCard_item"><span>International Journal of Innovative Research in Technology (IJIRT). </span><span>, 2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">It has been said that machine learning is a useful defense against the majority of cyber-attacks....</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">It has been said that machine learning is a useful defense against the majority of cyber-attacks. Therefore, the majority of computer attacks now have greater security thanks to the development of Artificial Intelligence (AI). Phishing assaults are dangerous, but they may be avoided using AI-powered solutions. This element points to the necessity of raising awareness of cyber security using AI. Most people's awareness will help to stop these kinds of attacks. The study explains how phishing attempts could be decreased if people were aware of AI-based cyber protection. Thus, the study illustrates the efficacy of AI-driven cyber security awareness education and its potential to impact cyberattacks.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="b69b48d6be9548568d4133775e532d43" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":116763293,"asset_id":122015374,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/116763293/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="122015374"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="122015374"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 122015374; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=122015374]").text(description); $(".js-view-count[data-work-id=122015374]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 122015374; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='122015374']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "b69b48d6be9548568d4133775e532d43" } } $('.js-work-strip[data-work-id=122015374]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":122015374,"title":"Phishing Attacks Prevention using Smart Based Artificial Intelligence Algorithms for Cyber Security Awareness","internal_url":"https://www.academia.edu/122015374/Phishing_Attacks_Prevention_using_Smart_Based_Artificial_Intelligence_Algorithms_for_Cyber_Security_Awareness","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":116763293,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/116763293/thumbnails/1.jpg","file_name":"Phishing_Attacks_Prevention_using_Smart_Based_Artificial_Intelligence_Algorithms_for_Cyber_Security_Awareness.pdf","download_url":"https://www.academia.edu/attachments/116763293/download_file","bulk_download_file_name":"Phishing_Attacks_Prevention_using_Smart.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/116763293/Phishing_Attacks_Prevention_using_Smart_Based_Artificial_Intelligence_Algorithms_for_Cyber_Security_Awareness-libre.pdf?1721440568=\u0026response-content-disposition=attachment%3B+filename%3DPhishing_Attacks_Prevention_using_Smart.pdf\u0026Expires=1740485480\u0026Signature=EzDnnT-Vfh9U5oEu3Arrhs3xJpA56PbJQkoUy7INafCZ23NYNXO~Awc2KbDt-beRvCR9DXwnrTG2v2tNJbPHxxyCiOtZYyyobqRLIQPFg8w2s4yQoLHbdA4BxtdPbs7zPygpGojArbU30UHXTYjCCmYbRQQc1nuNxun7oKrHUqX8yh4wZ9ajp9I7--JAbwKO17DH~4x1I1Mf1iERr5ccqIWQ6tDQIvLTXPorzxSaj2PLXa3MI1ayI-KvCOZXAG8sNxnrudcYX5qAMGo3JM~KfB1lHFAvOEnM4zolJYySvin--~waymPscOtFfrlfmoZftkwWbIYtCpEcwklkmlV1gA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="121803001"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/121803001/Recently_Emerging_Trends_in_Embedded_Computer_Vision"><img alt="Research paper thumbnail of Recently Emerging Trends in Embedded Computer Vision" class="work-thumbnail" src="https://attachments.academia-assets.com/116598911/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/121803001/Recently_Emerging_Trends_in_Embedded_Computer_Vision">Recently Emerging Trends in Embedded Computer Vision</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://rhemauniversity.academia.edu/IfeanyiNwokoro">Prof. Ifeanyi S Nwokoro</a>, <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/IKEGWU">ANAYO IKEGWU</a>, and <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/ELongkang">Emmanuel Longkang</a></span></div><div class="wp-workCard_item"><span>International Conference on Technological Solutions for Smart Economy| SmartEco’2024</span><span>, 2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">We explore recent advancements in embedded computer vision, particularly in object detection, rec...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">We explore recent advancements in embedded computer vision, particularly in object detection, recognition, and tracking. This study was motivated by the need to comprehend and optimize embedded vision technology; it meticulously examines various artificial intelligence methods and algorithms tailored for this field. By scrutinizing their strengths and weaknesses, it aims to address existing challenges and enhance performance. Additionally, the research surveys diverse application domains, such as drone-based object detection and traffic sign recognition, to demonstrate the practical relevance and adaptability of embedded vision technology across sectors. Through synthesizing key insights, including the significance of popular algorithms like YOLO (You Only Look Once) and the impact of large datasets on performance improvement, the study seeks to provide a comprehensive understanding of embedded vision technology. Ultimately, it aims to guide future efforts in this field, facilitating the creation of innovative solutions for real-world challenges.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="ffd11dc8a76c6900e9f86eb6754c80a2" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":116598911,"asset_id":121803001,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/116598911/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="121803001"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="121803001"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 121803001; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=121803001]").text(description); $(".js-view-count[data-work-id=121803001]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 121803001; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='121803001']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "ffd11dc8a76c6900e9f86eb6754c80a2" } } $('.js-work-strip[data-work-id=121803001]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":121803001,"title":"Recently Emerging Trends in Embedded Computer Vision","internal_url":"https://www.academia.edu/121803001/Recently_Emerging_Trends_in_Embedded_Computer_Vision","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":116598911,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/116598911/thumbnails/1.jpg","file_name":"Recently_Emerging_Trends_in_Embedded_Computer_Vision.pdf","download_url":"https://www.academia.edu/attachments/116598911/download_file","bulk_download_file_name":"Recently_Emerging_Trends_in_Embedded_Com.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/116598911/Recently_Emerging_Trends_in_Embedded_Computer_Vision-libre.pdf?1720211226=\u0026response-content-disposition=attachment%3B+filename%3DRecently_Emerging_Trends_in_Embedded_Com.pdf\u0026Expires=1740485480\u0026Signature=TAtlpPK8vMLmtF2ljFa63MR~XPtdcZuXDkCTabhaSy1qqysYIYFQW7b3S0dXAHhhkJ5jT~ndxkuI1yBHY-7PSGJz0~F-quznjXABul2uoLan5zjfyWBsQEHlVaH20xodV~tSf0Z1E7GrFIwDVubQ4hMpZ5wguHQkR2rPRRy9ABvoRB64MzvyhcI-sTG7zB-GJT4BHEFiutUIFv6JteJEdlK07fCDOU5~0cjWz-rg3VmqWhz07zZwOWc2vu9hbZOy8bq9dIpCs47RTB7LLdhTv0rVxIjX9LFNGfIucz6W8PLeeJ5E0dSU62tPTS8uRXErZvWZKTO24LyTzuHr2-crOw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="121802987"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/121802987/Implementing_Machine_Learning_Techniques_for_Artificial_Neural_Networks_in_5G_Network_Quality_of_Service_Management"><img alt="Research paper thumbnail of Implementing Machine Learning Techniques for Artificial Neural Networks in 5G Network Quality of Service Management" class="work-thumbnail" src="https://attachments.academia-assets.com/116598886/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/121802987/Implementing_Machine_Learning_Techniques_for_Artificial_Neural_Networks_in_5G_Network_Quality_of_Service_Management">Implementing Machine Learning Techniques for Artificial Neural Networks in 5G Network Quality of Service Management</a></div><div class="wp-workCard_item"><span>International Conference on Technological Solutions for Smart Economy| SmartEco’2024</span><span>, 2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">5G-New scenario transparency in communication between various types of networks that are intercon...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">5G-New scenario transparency in communication between various types of networks that are interconnected is expected in radio multimedia. A prevalent issue across all these diverse platforms is the equitable distribution of the restricted network resource among rival apps. A transcendent measure of how equitably properties are distributed to end-users is called Quality of Service (QoS). It is derived from subscriber satisfaction levels and depends on how quickly the network responds to possible infractions of established regulatory guidelines. There are discussion on the perspective of 5G network trust in terms of QoS management, demand formulation, xMBB, M-MTC, and U-MTC. There is a proposed architecture that controls access in the 5G network's data plane. A new cognitive engine for artificial intelligence that is built on memory is put forth. The idea is to translate the probabilistic sign of a set of variables related to resource distribution to the end-user for multi-service improvement.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="3280055ce2db35048d414ed5c238f60d" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":116598886,"asset_id":121802987,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/116598886/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="121802987"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="121802987"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 121802987; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=121802987]").text(description); $(".js-view-count[data-work-id=121802987]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 121802987; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='121802987']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "3280055ce2db35048d414ed5c238f60d" } } $('.js-work-strip[data-work-id=121802987]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":121802987,"title":"Implementing Machine Learning Techniques for Artificial Neural Networks in 5G Network Quality of Service Management","internal_url":"https://www.academia.edu/121802987/Implementing_Machine_Learning_Techniques_for_Artificial_Neural_Networks_in_5G_Network_Quality_of_Service_Management","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":116598886,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/116598886/thumbnails/1.jpg","file_name":"Implementing_Machine_Learning_Techniques_for_Artificial_Neural_Networks_in_5G_Network_Quality_of_Service_Management.pdf","download_url":"https://www.academia.edu/attachments/116598886/download_file","bulk_download_file_name":"Implementing_Machine_Learning_Techniques.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/116598886/Implementing_Machine_Learning_Techniques_for_Artificial_Neural_Networks_in_5G_Network_Quality_of_Service_Management-libre.pdf?1720211248=\u0026response-content-disposition=attachment%3B+filename%3DImplementing_Machine_Learning_Techniques.pdf\u0026Expires=1740485480\u0026Signature=Ia6z~Vm4~XCf6yOBn5wtShbflEUzs-juHD5Sgr4yCny5l4folvr0jQ9OmUpUmFc2GhKgaT1NHHKBoK49bz1ASdgsBJVB-8wu64MUrlzBOkD99m701DvPZ65x5S50PnG-o3eALXUQhXmBIY3yPu3vjuFO-Fb2zOxe0Q~1eB0pY6S89nu4fhXLcvUpQjECEptNbf5yTGKlAPa1~QOw2WM2NlJmZ-kkDUAfoARThFON5bgTyJkWYp1XO~7-Dm3GZbcHmcNDIIb0LVxnA-pH7FlmBMPfKrUFw-ilYirszH0IEt97NAtxMmJOYDVGX8TTpK8GorBwm6rtY89TNwequiNMsQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="121802882"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/121802882/Implementation_of_eHealth_Framework_for_Medical_Image_Analysis_using_Human_centered_Artificial_Intelligence_for_Cardiovascular_Diseases"><img alt="Research paper thumbnail of Implementation of eHealth Framework for Medical Image Analysis using Human-centered Artificial Intelligence for Cardiovascular Diseases" class="work-thumbnail" src="https://attachments.academia-assets.com/116598874/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/121802882/Implementation_of_eHealth_Framework_for_Medical_Image_Analysis_using_Human_centered_Artificial_Intelligence_for_Cardiovascular_Diseases">Implementation of eHealth Framework for Medical Image Analysis using Human-centered Artificial Intelligence for Cardiovascular Diseases</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://rhemauniversity.academia.edu/IfeanyiNwokoro">Prof. Ifeanyi S Nwokoro</a> and <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/JulianaOnah1">Onah J U L I A N A Obianuju</a></span></div><div class="wp-workCard_item"><span>International Conference on Technological Solutions for Smart Economy| SmartEco’2024</span><span>, 2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Human-centered artificial intelligence (HCAI) is pivotal for timely diagnosis and prediction of a...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Human-centered artificial intelligence (HCAI) is pivotal for timely diagnosis and prediction of ailments such as hypertension, stroke, and diabetes. This paper explores HCAI's role in early disease detection and immediate treatment solutions of the detected diseases. By designing transparent, ethical, and interactive systems, HCAI ensures the best interests of humans are upheld. Leveraging machine learning (ML) techniques, including Decision Tree, Random Forest, and K-Nearest Neigbor. The study attains high predictive accuracy in identifying diseases using the ML techniques. The analysis reveals factors influencing healthy living, facilitating early diagnosis. Results indicate significant improvement of 2% for decision tree and random forest respectively when compared with the baseline studies. Through predictive modeling, HCAI enhances disease analysis efficiency and patient care, offering accurate and timely diagnoses. This underscores the significance of integrating HCAI techniques for improved healthcare outcomes, empowering users with system understanding and control.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="37839f1498376f298eb3552fc09529d8" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":116598874,"asset_id":121802882,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/116598874/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="121802882"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="121802882"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 121802882; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=121802882]").text(description); $(".js-view-count[data-work-id=121802882]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 121802882; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='121802882']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "37839f1498376f298eb3552fc09529d8" } } $('.js-work-strip[data-work-id=121802882]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":121802882,"title":"Implementation of eHealth Framework for Medical Image\r\nAnalysis using Human-centered Artificial Intelligence for\r\nCardiovascular Diseases","internal_url":"https://www.academia.edu/121802882/Implementation_of_eHealth_Framework_for_Medical_Image_Analysis_using_Human_centered_Artificial_Intelligence_for_Cardiovascular_Diseases","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","email":"bW9POURoSXdjbk04alFYOW56TzhUOHd0UXlqQSs0V0FpN0I4THNsTGwwWlYzMUhHQUVUSkxtMXU2MUt2NTZ6dC0tbjVmaGozbzdURzJJMUFXL25IdFNSdz09--9665c76a76283c35aab5c6e529df11578f8c5b89"},"attachments":[{"id":116598874,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/116598874/thumbnails/1.jpg","file_name":"Implementation_of_eHealth_Framework_for_Medical_Image.pdf","download_url":"https://www.academia.edu/attachments/116598874/download_file","bulk_download_file_name":"Implementation_of_eHealth_Framework_for.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/116598874/Implementation_of_eHealth_Framework_for_Medical_Image-libre.pdf?1720211249=\u0026response-content-disposition=attachment%3B+filename%3DImplementation_of_eHealth_Framework_for.pdf\u0026Expires=1740381439\u0026Signature=MdFCHJeKnkO3cyCzYmtiPKMiAu3FrjNcQCZOx7Clenz2MT9ylJ7w65ROFvF-7ugI4pF-Rqt4BCvZfqYSX5a5yjzyv9eAexXF8uoAzB9dCZBrFzcva-m-jx~UXl1~GnN4yy~jpA~flfojeTZSJ73bmsGYbtcyvM6qARmItBQ3gKYqbJU5QKKnhNNq6EMbmD2YenpIC9wKuoC-7przy1zP9DOcUNdb6UsrVosolRopu67a5AdhRDABcuDZ0SWFLAmK0PEiDaPzzatBJah9qQxzCmkkV9exVqgd7uJXmCHe804RK-8qVTe1Rh3tdCaPMWysxd1xnHnPVuxdxtNCpByvcQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="121802863"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/121802863/CYBER_SECURITY_RISK_ASSESSMENTS_COMPLIANCE_AND_VIOLATIONS_A_systematic_Review_of_the_intervening_role_of_top_Management_in_Organizations"><img alt="Research paper thumbnail of CYBER SECURITY RISK ASSESSMENTS, COMPLIANCE AND VIOLATIONS: A systematic Review of the intervening role of top Management in Organizations" class="work-thumbnail" src="https://attachments.academia-assets.com/116598848/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/121802863/CYBER_SECURITY_RISK_ASSESSMENTS_COMPLIANCE_AND_VIOLATIONS_A_systematic_Review_of_the_intervening_role_of_top_Management_in_Organizations">CYBER SECURITY RISK ASSESSMENTS, COMPLIANCE AND VIOLATIONS: A systematic Review of the intervening role of top Management in Organizations</a></div><div class="wp-workCard_item"><span>International Conference on Technological Solutions for Smart Economy| SmartEco’2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Study on how managers respond to cyber security breaches has focused on exterior activities, such...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Study on how managers respond to cyber security breaches has focused on exterior activities, such as customer service and crisis management. An internal breach inside the</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="c787e1b85b65890b5b1b4ae8d642882a" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":116598848,"asset_id":121802863,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/116598848/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="121802863"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="121802863"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 121802863; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=121802863]").text(description); $(".js-view-count[data-work-id=121802863]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 121802863; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='121802863']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "c787e1b85b65890b5b1b4ae8d642882a" } } $('.js-work-strip[data-work-id=121802863]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":121802863,"title":"CYBER SECURITY RISK ASSESSMENTS, COMPLIANCE AND VIOLATIONS: A systematic Review of the intervening role of top Management in Organizations","internal_url":"https://www.academia.edu/121802863/CYBER_SECURITY_RISK_ASSESSMENTS_COMPLIANCE_AND_VIOLATIONS_A_systematic_Review_of_the_intervening_role_of_top_Management_in_Organizations","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":116598848,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/116598848/thumbnails/1.jpg","file_name":"CYBER_SECURITY_RISK_ASSESSMENTS_COMPLIANCE_AND.pdf","download_url":"https://www.academia.edu/attachments/116598848/download_file","bulk_download_file_name":"CYBER_SECURITY_RISK_ASSESSMENTS_COMPLIAN.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/116598848/CYBER_SECURITY_RISK_ASSESSMENTS_COMPLIANCE_AND-libre.pdf?1720211268=\u0026response-content-disposition=attachment%3B+filename%3DCYBER_SECURITY_RISK_ASSESSMENTS_COMPLIAN.pdf\u0026Expires=1740485480\u0026Signature=dI0TrNwk-mX2xhTJIE4sAwntEyDL38m3jbDjl0jiLzNlmvEKlZwSqvQC1zufE-giTQHE7U4Uayjg0-HxmjjlHIH0J0gO1Xy679ZwfTCjkvnGxgewHLiLIAWE2rdEwfBkQSKWUZ4ir~6HZayyOBhlWY1~21MrbfQDfv7G4WdMOHCE1nG25ktN41RW1SxP0I6nm1J6dYMK8ahkzDw2H6xHouam60sOuX-Cwh0Sj0VSycqDIl1dW1YwVIimRwZuqlW4ZsHpkCXodmDZ2ooUzPLLzfIzLYQKYCe3pFqInq3ixT~YtMilh3UF0ztZw0KD2ysD89cgGDKqYwLUMYqcQ~FYTA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="121709986"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/121709986/CYBER_SECURITY_CHALLENGES_IN_A_SMART_AND_DIGITAL_ECONOMY_A_preliminary_research_overview_of_the_emerging_threats_to_data_stored_in_information_systems"><img alt="Research paper thumbnail of CYBER SECURITY CHALLENGES IN A SMART AND DIGITAL ECONOMY: A preliminary research overview of the emerging threats to data stored in information systems" class="work-thumbnail" src="https://attachments.academia-assets.com/116526222/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/121709986/CYBER_SECURITY_CHALLENGES_IN_A_SMART_AND_DIGITAL_ECONOMY_A_preliminary_research_overview_of_the_emerging_threats_to_data_stored_in_information_systems">CYBER SECURITY CHALLENGES IN A SMART AND DIGITAL ECONOMY: A preliminary research overview of the emerging threats to data stored in information systems</a></div><div class="wp-workCard_item"><span>Global Scientific Journals</span><span>, 2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">IT security incidents have evolved over the past few decades from isolated information system att...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">IT security incidents have evolved over the past few decades from isolated information system attacks to deliberate, focused and complex cyber dangers at even national, institutional or individual level. Digital technology's interconnectedness has many advantages, but it also creates a number of new risks that have broad ramifications. Even though the phrases are sometimes used synonymously, information security and cyber security are not the same. The transition from information security to cyber security was covered in this study, primarily as a paradigm shift in the defense against persistent threats. While it was sufficient to undertake basic defense against "common" attacks in the information security era, organizations now need to develop clever, creative, and effective controls to identify and stop sophisticated and emerging cyber-attacks. Cyber security initiatives should now involve the entire organization, including participation from all staff members, rather than just IT departments or designated persons. Cyber security should be strategically connected with corporate strategy, just as digital technologies are. We have carried out preliminary research on the level of maturity of security measures in Nigerian large firms that are associated with vital or significant national infrastructure. We concluded that while basic protection works well, there is still space for improvement when it comes to implementing more sophisticated controls and pursuing a shared goal of comprehensive cyber security governance.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="fbc0dd507ee36b52051cf83675107f36" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":116526222,"asset_id":121709986,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/116526222/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="121709986"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="121709986"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 121709986; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=121709986]").text(description); $(".js-view-count[data-work-id=121709986]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 121709986; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='121709986']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "fbc0dd507ee36b52051cf83675107f36" } } $('.js-work-strip[data-work-id=121709986]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":121709986,"title":"CYBER SECURITY CHALLENGES IN A SMART AND DIGITAL ECONOMY: A preliminary research overview of the emerging threats to data stored in information systems","internal_url":"https://www.academia.edu/121709986/CYBER_SECURITY_CHALLENGES_IN_A_SMART_AND_DIGITAL_ECONOMY_A_preliminary_research_overview_of_the_emerging_threats_to_data_stored_in_information_systems","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","email":"U0NubFgxSGxZUEJXYjdwcmJuSlByQlVRT3IxYk1oTW9Sa0dNVXAyWS9NMTBHdGZQY3RnNkpNRm5PV0R3bnNFYy0tZkY2TTEwTkZnRkI2aUQzMHhrQTdaQT09--0e9c5078b6ce000048fec7d904a3ba5c4a2273b7"},"attachments":[{"id":116526222,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/116526222/thumbnails/1.jpg","file_name":"CYBER_SECURITY_CHALLENGES_IN_A_SMART_AND_DIGITAL_ECONOMY.pdf","download_url":"https://www.academia.edu/attachments/116526222/download_file","bulk_download_file_name":"CYBER_SECURITY_CHALLENGES_IN_A_SMART_AND.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/116526222/CYBER_SECURITY_CHALLENGES_IN_A_SMART_AND_DIGITAL_ECONOMY-libre.pdf?1719914841=\u0026response-content-disposition=attachment%3B+filename%3DCYBER_SECURITY_CHALLENGES_IN_A_SMART_AND.pdf\u0026Expires=1740381753\u0026Signature=QVim3ohHbasgKCLWpJoHUQKvlc05vSAY131gCqa3UXSY2hd3jhfGArEKMMrracUwFSFbh-FeP-3P2nVxSBS3gHrgACA5LI67~~d~jrSRO68xUTyWZBJ~QsqnMdxm4QtAE-NZSkFrJ4BXVscI1tI7dJftLeo6L31lK5HVJhp14UhPJ3g1sJjg59Gvab2HlzEBLDjiXHs0-bAncvKGWnhuvKYyhAQpcwACEji4DatbeOapLvmXwbHGNMCA3F6alMs-WWMJj6dxOFsWnYyx5BgKFZOKBM6fHGBOU~ktou-5thDg8z~9gDrdtix2jz39kHeUABE2Blf9t8JT5tOHpEcwBQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="121709662"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/121709662/INTELLIGENT_COGNITIVE_ENGINE_FOR_5G_NETWORK_QUALITY_OF_SERVICE_MANAGEMENT"><img alt="Research paper thumbnail of INTELLIGENT COGNITIVE ENGINE FOR 5G NETWORK QUALITY OF SERVICE MANAGEMENT" class="work-thumbnail" src="https://attachments.academia-assets.com/116525962/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/121709662/INTELLIGENT_COGNITIVE_ENGINE_FOR_5G_NETWORK_QUALITY_OF_SERVICE_MANAGEMENT">INTELLIGENT COGNITIVE ENGINE FOR 5G NETWORK QUALITY OF SERVICE MANAGEMENT</a></div><div class="wp-workCard_item"><span>International Journal of Wireless & Mobile Networks (IJWMN)</span><span>, 2024</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">5G-New scenario transparency in communication between various types of networks that are intercon...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">5G-New scenario transparency in communication between various types of networks that are interconnected is expected in radio multimedia. A prevalent issue across all these diverse platforms is the equitable distribution of the restricted network resource among rival apps. A transcendent measure of how equitably properties are distributed to end-users is called Quality of Service (QoS). It is derived from subscriber satisfaction levels and depends on how quickly the network responds to possible infractions of established regulatory guidelines. There are discussion on the perspective of 5G network trust in terms of QoS management, demand formulation, xMBB, M-MTC, and U-MTC. There is a proposed architecture that controls access in the 5G network's data plane. A new cognitive engine for artificial intelligence that is built on memory is put forth. The idea is to translate the probabilistic sign of a set of variables related to resource distribution to the end-user for multi-service improvement.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="5525ea67b625861c773a444594f87158" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":116525962,"asset_id":121709662,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/116525962/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="121709662"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="121709662"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 121709662; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=121709662]").text(description); $(".js-view-count[data-work-id=121709662]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 121709662; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='121709662']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "5525ea67b625861c773a444594f87158" } } $('.js-work-strip[data-work-id=121709662]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":121709662,"title":"INTELLIGENT COGNITIVE ENGINE FOR 5G NETWORK QUALITY OF SERVICE MANAGEMENT","internal_url":"https://www.academia.edu/121709662/INTELLIGENT_COGNITIVE_ENGINE_FOR_5G_NETWORK_QUALITY_OF_SERVICE_MANAGEMENT","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":116525962,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/116525962/thumbnails/1.jpg","file_name":"INTELLIGENTCOGNITIVE_ENGINE_FOR_5G_QUALITY_OF_SERVICE_MANAGEMENT.pdf","download_url":"https://www.academia.edu/attachments/116525962/download_file","bulk_download_file_name":"INTELLIGENT_COGNITIVE_ENGINE_FOR_5G_NETW.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/116525962/INTELLIGENTCOGNITIVE_ENGINE_FOR_5G_QUALITY_OF_SERVICE_MANAGEMENT-libre.pdf?1719914941=\u0026response-content-disposition=attachment%3B+filename%3DINTELLIGENT_COGNITIVE_ENGINE_FOR_5G_NETW.pdf\u0026Expires=1740485480\u0026Signature=R9E2I5hzB~AFng3Q2O5~xxeuVNDAv-17Vi2AGDKXQECkxPHNLhKAPlIgAZXdf1nRnA0s7~6Dq7XcUJYZCf8eyZPr8MURzSxKAW8MHtWhGgnc0GUE7pXDFn0J4t9duIRG2gPm~p0oeB1oFWLCYiYCZDJ-QBN3A6RfPBYbdrD~nIevJlRqBi1lmDM3iZYeojnCDAQAUvoJFEH69rJc3J-o20H6xoCt57Oh-tsiQTgGmOBLuL7~7oZPPp4KieeujIfooJfp3ILZs1Qg6OCigRt0tQoRENVwNqFuuRRpnL2UWfnKAdiIdC2Y64~3xxZuSqhVMbmwvrBMEAC5C3pn6Sazdg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="115060231"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/115060231/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift"><img alt="Research paper thumbnail of Technology Advancement and University Education in Nigeria: History, Trade Unionism and Pattern-Shift" class="work-thumbnail" src="https://attachments.academia-assets.com/111578790/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/115060231/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift">Technology Advancement and University Education in Nigeria: History, Trade Unionism and Pattern-Shift</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="f97fe461e882c29a50f0a245be8643d2" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":111578790,"asset_id":115060231,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/111578790/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="115060231"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="115060231"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 115060231; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=115060231]").text(description); $(".js-view-count[data-work-id=115060231]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 115060231; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='115060231']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "f97fe461e882c29a50f0a245be8643d2" } } $('.js-work-strip[data-work-id=115060231]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":115060231,"title":"Technology Advancement and University Education in Nigeria: History, Trade Unionism and Pattern-Shift","internal_url":"https://www.academia.edu/115060231/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":111578790,"title":"","file_type":"docx","scribd_thumbnail_url":"https://attachments.academia-assets.com/111578790/thumbnails/1.jpg","file_name":"Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift.docx","download_url":"https://www.academia.edu/attachments/111578790/download_file","bulk_download_file_name":"Technology_Advancement_and_University_Ed.docx","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/111578790/Technology_Advancement_and_University_Education_in_Nigeria_History_Trade_Unionism_and_Pattern_Shift.docx?1708258272=\u0026response-content-disposition=attachment%3B+filename%3DTechnology_Advancement_and_University_Ed.docx\u0026Expires=1740485480\u0026Signature=AXIaQ1SBFNSA3I8DRm4esYIIr6MBOBV5nyjZBb8qHucCwVc-opZ4bXpcEmKkYimlNYhZyGF2JoeXav4rgvntmSURcoUUdFcXqDxcANLAW20BaM2BgxVMS5tsGN76FKIAR7L6Xrpi3b5wiHKAFJR-ZQtwQzgfnS-CiTYuGNVP4EqJBdTNBKmO9ThUN6izirqIVtyUP1CXYO2VUoEzfC~OjEXwD62~EUVB7a4EVCswE0Egmuc33fZmfGmxNHHhepb9Leqym2X6OXQn8Sji6WB0xwS0kTkUpg40-Hw5GKamX9ivIChLXtbw~0XqTwkt3N1agDGGDELz4zYAl90DG2-ueA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="112212431"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/112212431/Implementation_of_the_Geographic_Information_Systems_GISs_using_Object_Oriented_Programming_Methods"><img alt="Research paper thumbnail of Implementation of the Geographic Information Systems (GISs) using Object-Oriented Programming Methods" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/112212431/Implementation_of_the_Geographic_Information_Systems_GISs_using_Object_Oriented_Programming_Methods">Implementation of the Geographic Information Systems (GISs) using Object-Oriented Programming Methods</a></div><div class="wp-workCard_item"><span>Academia letters</span><span>, Aug 27, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Geographic Information Systems (GISs) are computer-based systems for the analysis, display, and r...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Geographic Information Systems (GISs) are computer-based systems for the analysis, display, and retrieval of spatial data which directly or indirectly illustrates a particular geographical area or location. The improvement in the exploit and complexity of GIS systems has created some research awareness which has contributed to a dynamic and expanding academic society using objects, associations, and generalizations. Object-Oriented Programming has ensured ease in the creation of GIS systems with apparent understanding and applications.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="112212431"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="112212431"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 112212431; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=112212431]").text(description); $(".js-view-count[data-work-id=112212431]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 112212431; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='112212431']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=112212431]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":112212431,"title":"Implementation of the Geographic Information Systems (GISs) using Object-Oriented Programming Methods","internal_url":"https://www.academia.edu/112212431/Implementation_of_the_Geographic_Information_Systems_GISs_using_Object_Oriented_Programming_Methods","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="112212430"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/112212430/Application_of_Object_Oriented_Analysis_and_Design_Methodology_in_modeling_of_University_Administrative_Information_System"><img alt="Research paper thumbnail of Application of Object-Oriented Analysis and Design Methodology in modeling of University Administrative Information System" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/112212430/Application_of_Object_Oriented_Analysis_and_Design_Methodology_in_modeling_of_University_Administrative_Information_System">Application of Object-Oriented Analysis and Design Methodology in modeling of University Administrative Information System</a></div><div class="wp-workCard_item"><span>Academia letters</span><span>, Nov 2, 2021</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="112212430"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="112212430"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 112212430; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=112212430]").text(description); $(".js-view-count[data-work-id=112212430]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 112212430; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='112212430']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=112212430]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":112212430,"title":"Application of Object-Oriented Analysis and Design Methodology in modeling of University Administrative Information System","internal_url":"https://www.academia.edu/112212430/Application_of_Object_Oriented_Analysis_and_Design_Methodology_in_modeling_of_University_Administrative_Information_System","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","email":"K0tqbnI1T0trT05VZ0dnV1BnRGVya1R0YncycFd6anJOQlhyZUJwenEyZjhMQzhsVSszSnlvT3J1bmJ6ZndlSy0tdlBwYUNxaXF1QS9udVhWY0prOUZpdz09--ba5981a7bde88e0ebc6433d5893495479fa4fc00"},"attachments":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="112212412"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/112212412/Object_Oriented_Programming_and_Software_Development_Paradigm"><img alt="Research paper thumbnail of Object-Oriented Programming and Software Development Paradigm" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/112212412/Object_Oriented_Programming_and_Software_Development_Paradigm">Object-Oriented Programming and Software Development Paradigm</a></div><div class="wp-workCard_item"><span>Academia letters</span><span>, Sep 20, 2021</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="112212412"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="112212412"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 112212412; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=112212412]").text(description); $(".js-view-count[data-work-id=112212412]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 112212412; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='112212412']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=112212412]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":112212412,"title":"Object-Oriented Programming and Software Development Paradigm","internal_url":"https://www.academia.edu/112212412/Object_Oriented_Programming_and_Software_Development_Paradigm","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","email":"MjBjNGRJdUVKNS9yWHRzTXVQR0plMjdWSkVrTlJmL2xZNnR2S0lTV0tTZE1VZlRDK3ZqZUF0dm9kMWFOQlZwTi0tM1Z5U1dOaUNMc1NJYlBIWlRoTkdhQT09--88c174725145034c416bb8c63fdf09b08c4bb030"},"attachments":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="76173630"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/76173630/Application_of_Object_Oriented_Analysis_and_Design_Methodology_in_modeling_of_University_Administrative_Information_System"><img alt="Research paper thumbnail of Application of Object-Oriented Analysis and Design Methodology in modeling of University Administrative Information System" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/76173630/Application_of_Object_Oriented_Analysis_and_Design_Methodology_in_modeling_of_University_Administrative_Information_System">Application of Object-Oriented Analysis and Design Methodology in modeling of University Administrative Information System</a></div><div class="wp-workCard_item"><span>Academia Letters</span><span>, 2021</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="76173630"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="76173630"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 76173630; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=76173630]").text(description); $(".js-view-count[data-work-id=76173630]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 76173630; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='76173630']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=76173630]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":76173630,"title":"Application of Object-Oriented Analysis and Design Methodology in modeling of University Administrative Information System","internal_url":"https://www.academia.edu/76173630/Application_of_Object_Oriented_Analysis_and_Design_Methodology_in_modeling_of_University_Administrative_Information_System","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","email":"UnYyYUJBNUJQcW5WbGpuQXkzNGdiZUlqK29RRndsN0lqS0cvbzUyMmlGSXVsQkVsY0tqNkhRREFZdEJGbHRHLy0tOXVkMnBHVU1sM01EQzh4MXFQN28rdz09--d300056c91bed5085e509236bd823545d6c1b903"},"attachments":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="76173601"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" rel="nofollow" href="https://www.academia.edu/76173601/Object_Oriented_Programming_and_Software_Development_Paradigm"><img alt="Research paper thumbnail of Object-Oriented Programming and Software Development Paradigm" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" rel="nofollow" href="https://www.academia.edu/76173601/Object_Oriented_Programming_and_Software_Development_Paradigm">Object-Oriented Programming and Software Development Paradigm</a></div><div class="wp-workCard_item"><span>Academia Letters</span><span>, 2021</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="76173601"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="76173601"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 76173601; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=76173601]").text(description); $(".js-view-count[data-work-id=76173601]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 76173601; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='76173601']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=76173601]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":76173601,"title":"Object-Oriented Programming and Software Development Paradigm","internal_url":"https://www.academia.edu/76173601/Object_Oriented_Programming_and_Software_Development_Paradigm","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro","email":"QjRMZDVIRy9JMklCend1bkIwTFFoL2lsQ0pPeUgzMy95cCt4cTVzOGdEV2YyRmJkbUkrYUZsYkV3b1J1UWp5OS0tQXFXTHFHNXRWcHFzRkhsZFRwMUJydz09--a8fa91b87c63d651f34c53ea0ed47bae6e817b35"},"attachments":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="63319249"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/63319249/Implementation_of_the_Geographic_Information_Systems_GISs_using_Object_Oriented_Programming_Methods"><img alt="Research paper thumbnail of Implementation of the Geographic Information Systems (GISs) using Object-Oriented Programming Methods" class="work-thumbnail" src="https://attachments.academia-assets.com/76044865/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/63319249/Implementation_of_the_Geographic_Information_Systems_GISs_using_Object_Oriented_Programming_Methods">Implementation of the Geographic Information Systems (GISs) using Object-Oriented Programming Methods</a></div><div class="wp-workCard_item"><span>Academia Letters</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Geographic Information Systems (GISs) are computer-based systems for the analysis, display, and r...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Geographic Information Systems (GISs) are computer-based systems for the analysis, display,<br />and retrieval of spatial data which directly or indirectly illustrates a particular geographical<br />area or location. The improvement in the exploit and complexity of GIS systems has created<br />some research awareness which has contributed to a dynamic and expanding academic society<br />using objects, associations, and generalizations. Object-Oriented Programming has ensured<br />ease in the creation of GIS systems with apparent understanding and applications.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="3a80093be1486299d2e172dacf181cd8" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":76044865,"asset_id":63319249,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/76044865/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="63319249"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="63319249"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 63319249; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=63319249]").text(description); $(".js-view-count[data-work-id=63319249]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 63319249; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='63319249']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "3a80093be1486299d2e172dacf181cd8" } } $('.js-work-strip[data-work-id=63319249]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":63319249,"title":"Implementation of the Geographic Information Systems (GISs) using Object-Oriented Programming Methods","internal_url":"https://www.academia.edu/63319249/Implementation_of_the_Geographic_Information_Systems_GISs_using_Object_Oriented_Programming_Methods","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":76044865,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/76044865/thumbnails/1.jpg","file_name":"Implementation_of_the_Geographic_Information_Systems.pdf","download_url":"https://www.academia.edu/attachments/76044865/download_file","bulk_download_file_name":"Implementation_of_the_Geographic_Informa.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/76044865/Implementation_of_the_Geographic_Information_Systems-libre.pdf?1639120909=\u0026response-content-disposition=attachment%3B+filename%3DImplementation_of_the_Geographic_Informa.pdf\u0026Expires=1740485480\u0026Signature=XZEIlB~5jxaAc07TSFDG6HVLzWE7GKNpbwS-IKqImRUplg2OKcF6~qevgV6vtD666b7r-~-DDnliTuXAWAZrywKdsYxoIyV8rS0Q3SFdMx69-hLffGo9-3wN-9RUAmDRRZ53vgEZiWAtX6u2b7zEf5M7MaDKU9qs~sDLRyHQNT5bZPf801kq-QYB2kz71S5bubzhYNN0FrI3ke-3lqWRLmXrorwi6JKo1dASTTE2FVx37PLrikWKvKQUClJJgM5b0i8tYmsEjmYiJsgO34W~Qjv7F602UNN-YIjoFklCKWdfxWTJePDEO2E-f10Eo66S6gs6ro5PU3MX6CpxElabvA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="60835266"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/60835266/Application_of_Object_Oriented_Analysis_and_Design_Methodology_in_modeling_of_University_Administrative_Information_System"><img alt="Research paper thumbnail of Application of Object-Oriented Analysis and Design Methodology in modeling of University Administrative Information System" class="work-thumbnail" src="https://attachments.academia-assets.com/74256400/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/60835266/Application_of_Object_Oriented_Analysis_and_Design_Methodology_in_modeling_of_University_Administrative_Information_System">Application of Object-Oriented Analysis and Design Methodology in modeling of University Administrative Information System</a></div><div class="wp-workCard_item"><span>Academia Letters</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">There is an urgent need for a pattern shift in the manual ways that the university administration...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">There is an urgent need for a pattern shift in the manual ways that the university administration conducts some of its operations due to the inherent errors. There is a need to change from the paper-based appraisal processes, leave request application, course allocation, task and responsibility delegation, monthly returns, trails in the wages and salary, instant payslip delivery, medical diagnosis and prescriptions, loan request and approval, staff movement, transcript request and approval, students management system, promotion, resignation, and etcetera. For this reason, there is the desire for modeling the university administrative information system by using Object-Oriented Analysis and Design (OOAD) Methodology. The outcomes are numerous, day-today activities with regards to the university operations can be carried out electronically with the assistance of the Unified Modeling Languages (UML). The new system will assist in most of the university operations by eliminating inefficiency and reducing TurnAround Time (TAT) from the Standard Operating Procedures (SOP) in the Nigerian Universities.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="b39c4416ef20c14a2680eca72f33ef5b" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":74256400,"asset_id":60835266,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/74256400/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="60835266"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="60835266"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 60835266; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=60835266]").text(description); $(".js-view-count[data-work-id=60835266]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 60835266; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='60835266']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "b39c4416ef20c14a2680eca72f33ef5b" } } $('.js-work-strip[data-work-id=60835266]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":60835266,"title":"Application of Object-Oriented Analysis and Design Methodology in modeling of University Administrative Information System","internal_url":"https://www.academia.edu/60835266/Application_of_Object_Oriented_Analysis_and_Design_Methodology_in_modeling_of_University_Administrative_Information_System","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":74256400,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/74256400/thumbnails/1.jpg","file_name":"letter20211106-15642-129at14.pdf","download_url":"https://www.academia.edu/attachments/74256400/download_file","bulk_download_file_name":"Application_of_Object_Oriented_Analysis.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/74256400/letter20211106-15642-129at14-libre.pdf?1636191933=\u0026response-content-disposition=attachment%3B+filename%3DApplication_of_Object_Oriented_Analysis.pdf\u0026Expires=1740485480\u0026Signature=KQ0uWrGDIzqI1g-EeMNYS6uIm0vgwl1qrq9VL-oEZqLkOIwZShus4zSn4djxUyfnpjoApxUf~aU6PBDOUzfOJsDwO6fZO3uExXdnb2gU3SfyR4K3y9qd-U7V-fAYJldZ7xOG2YBOZYBNazCeu41HrkdeSqShiDD5oZ4u4eH3hOYW2LYBcQLLqySJfJMOf7RsywCPiCucmZ~ea79gju9lPjDrkanWh2xcDVMIKg92Z4nbHBWP6dvhcGAh1NXdS7PxIUw-G6WBSJwqXD1phm25y4zDQhWS0YfZh4h47y2kiULXyUZnDIt-szaK9kvhQT-cNlYE8scraRs~I1eUgxzAUQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="53051223"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/53051223/Object_Oriented_Programming_and_Software_Development_Paradigm"><img alt="Research paper thumbnail of Object-Oriented Programming and Software Development Paradigm" class="work-thumbnail" src="https://attachments.academia-assets.com/70211541/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/53051223/Object_Oriented_Programming_and_Software_Development_Paradigm">Object-Oriented Programming and Software Development Paradigm</a></div><div class="wp-workCard_item"><span>Academia Letters</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Object-Oriented Programming (OOP) Software Development Paradigm, birthed some few decades ago wit...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Object-Oriented Programming (OOP) Software Development Paradigm, birthed some few decades ago with provisions for a varied understanding of programming languages than the primordial procedural programming parlance in software development (FORTRAN, Pascal, C, and etcetera). The OOP ab-initio didn't provide some resounding assurances and attractively structured codes to the users without the use of "goto" provisions. OOP at this point has attained some feet as excellent programming practices are now guaranteed and be defined. OOP is attributed as a methodology or a tactic that focused on such ways objects work together to express data sharing. It has changed the procedural conception of programming where vast attention is saddled on procedures and logic. There are seven essential concepts in Object-Oriented Programming (OOP) Software Development. The first is an Object. An Object is an encapsulated entity that provides sets of predetermined services at a given period. It is also looked upon as anything that has existence and with some value. Subsequently is Class; a class is the main body of a system. It creates the federating units of a system. We also have Generalization, Inheritance, Abstraction, Polymorphism, and Encapsulation. Not all programmers believe that OOP is a methodology.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="85cfde6bd39c3a44734637b682ed89a7" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{"attachment_id":70211541,"asset_id":53051223,"asset_type":"Work","button_location":"profile"}" href="https://www.academia.edu/attachments/70211541/download_file?s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="53051223"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="53051223"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 53051223; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=53051223]").text(description); $(".js-view-count[data-work-id=53051223]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 53051223; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='53051223']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "85cfde6bd39c3a44734637b682ed89a7" } } $('.js-work-strip[data-work-id=53051223]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":53051223,"title":"Object-Oriented Programming and Software Development Paradigm","internal_url":"https://www.academia.edu/53051223/Object_Oriented_Programming_and_Software_Development_Paradigm","owner_id":116522139,"coauthors_can_edit":true,"owner":{"id":116522139,"first_name":"Prof. Ifeanyi","middle_initials":"S","last_name":"Nwokoro","page_name":"IfeanyiNwokoro","domain_name":"rhemauniversity","created_at":"2019-06-10T01:32:09.859-07:00","display_name":"Prof. Ifeanyi S Nwokoro","url":"https://rhemauniversity.academia.edu/IfeanyiNwokoro"},"attachments":[{"id":70211541,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/70211541/thumbnails/1.jpg","file_name":"letter20210925-13393-gdhnki.pdf","download_url":"https://www.academia.edu/attachments/70211541/download_file","bulk_download_file_name":"Object_Oriented_Programming_and_Software.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/70211541/letter20210925-13393-gdhnki-libre.pdf?1632559909=\u0026response-content-disposition=attachment%3B+filename%3DObject_Oriented_Programming_and_Software.pdf\u0026Expires=1740485480\u0026Signature=C0hZAGDsOTGi9~N3G8n~gOGDSk7xAlCIwrqFYZaxwmyczOnzSeiAB9DIrHoW9vSeQsUOAUURe48UOy-zc9c-d4qbbjn4ilhoqMS-D3OS5FkrS9XpXEfHvIXLrPrNbs9eoajoZyjy2YTE4g1EVL13GrVHulDT~nR2~ASTHaqDEmyN8e7ucAaHKnzVe8Fm3jnHCQyTX1e-wPRwCrVkYk6aJ0NTEuK5hGRtNnFyTwyWeN7LvPNk9QiYRqXvSNFPA~fVw1a92tr2n6N1DxoJaZR9gGIRLgQ35l5DdK~YDdR4DPgQT9sq3eoHSqoG5ChwGGhbeSGzRMUvbVjSWj9bl0AN3A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js","https://a.academia-assets.com/assets/google_contacts-0dfb882d836b94dbcb4a2d123d6933fc9533eda5be911641f20b4eb428429600.js"], function() { // from javascript_helper.rb $('.js-google-connect-button').click(function(e) { e.preventDefault(); GoogleContacts.authorize_and_show_contacts(); Aedu.Dismissibles.recordClickthrough("WowProfileImportContactsPrompt"); }); $('.js-update-biography-button').click(function(e) { e.preventDefault(); Aedu.Dismissibles.recordClickthrough("UpdateUserBiographyPrompt"); $.ajax({ url: $r.api_v0_profiles_update_about_path({ subdomain_param: 'api', about: "", }), type: 'PUT', success: function(response) { location.reload(); } }); }); $('.js-work-creator-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_document_path({ source: encodeURIComponent(""), }); }); $('.js-video-upload-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_video_path({ source: encodeURIComponent(""), }); }); $('.js-do-this-later-button').click(function() { $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("WowProfileImportContactsPrompt"); }); $('.js-update-biography-do-this-later-button').click(function(){ $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("UpdateUserBiographyPrompt"); }); $('.wow-profile-mentions-upsell--close').click(function(){ $('.wow-profile-mentions-upsell--panel').hide(); Aedu.Dismissibles.recordDismissal("WowProfileMentionsUpsell"); }); $('.wow-profile-mentions-upsell--button').click(function(){ Aedu.Dismissibles.recordClickthrough("WowProfileMentionsUpsell"); }); new WowProfile.SocialRedesignUserWorks({ initialWorksOffset: 20, allWorksOffset: 20, maxSections: 1 }) }); </script> </div></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile_edit-5ea339ee107c863779f560dd7275595239fed73f1a13d279d2b599a28c0ecd33.js","https://a.academia-assets.com/assets/add_coauthor-22174b608f9cb871d03443cafa7feac496fb50d7df2d66a53f5ee3c04ba67f53.js","https://a.academia-assets.com/assets/tab-dcac0130902f0cc2d8cb403714dd47454f11fc6fb0e99ae6a0827b06613abc20.js","https://a.academia-assets.com/assets/wow_profile-a9bf3a2bc8c89fa2a77156577594264ee8a0f214d74241bc0fcd3f69f8d107ac.js"], function() { // from javascript_helper.rb window.ae = window.ae || {}; window.ae.WowProfile = window.ae.WowProfile || {}; if(Aedu.User.current && Aedu.User.current.id === $viewedUser.id) { window.ae.WowProfile.current_user_edit = {}; new WowProfileEdit.EditUploadView({ el: '.js-edit-upload-button-wrapper', model: window.$current_user, }); new AddCoauthor.AddCoauthorsController(); } var userInfoView = new WowProfile.SocialRedesignUserInfo({ recaptcha_key: "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB" }); WowProfile.router = new WowProfile.Router({ userInfoView: userInfoView }); Backbone.history.start({ pushState: true, root: "/" + $viewedUser.page_name }); new WowProfile.UserWorksNav() }); </script> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; } .sign-in-with-apple-button > div { margin: 0 auto; / This centers the Apple-rendered button horizontally }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span ="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "2c8ae69297bee26f59045a865427c6e3dc6d88e366b95be1f289e74a5a13f150", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="cNhmR6qR5kcRNrUqLvjaVg00bHoubmMwRC-cd84srBXxtAR_LVobDkaxExLREL0GC0PyMmmmRRdzYqgoGu1kfA" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://rhemauniversity.academia.edu/IfeanyiNwokoro" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="Us98WWQK3fw12pfTemniqrJZl6hAHEF3ztJ7qtKnTmHTox5h48EgtWJdMeuFgYX6tC4J4AfUZ1D5n0_1BmaGCA" autocomplete="off" /><p>Enter the email address you signed up with and we'll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account? <a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg> <strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/hc/en-us"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg> <strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia ©2025</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>