Celestine Iwendi

ORCID: 0000-0003-4350-3911
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Artificial Intelligence in Healthcare
  • Network Security and Intrusion Detection
  • Energy Efficient Wireless Sensor Networks
  • Advanced Malware Detection Techniques
  • COVID-19 diagnosis using AI
  • Security in Wireless Sensor Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Spam and Phishing Detection
  • Privacy-Preserving Technologies in Data
  • IoT-based Smart Home Systems
  • Smart Agriculture and AI
  • Opportunistic and Delay-Tolerant Networks
  • Brain Tumor Detection and Classification
  • Mobile Ad Hoc Networks
  • Cloud Data Security Solutions
  • Misinformation and Its Impacts
  • Internet Traffic Analysis and Secure E-voting
  • Internet of Things and AI
  • Text and Document Classification Technologies
  • Advanced Wireless Communication Technologies
  • Chaos-based Image/Signal Encryption
  • Smart Grid Energy Management
  • Water Quality Monitoring Technologies

University of Bolton
2021-2025

Creative Technologies (United States)
2024-2025

Institute of Electrical and Electronics Engineers
2023-2024

Vellore Institute of Technology University
2024

VIT-AP University
2024

Christ University
2024

Lead City University
2020-2023

Central South University of Forestry and Technology
2018-2021

Central South University
2018-2021

Islamic Azad University, Tehran
2021

Integration of artificial intelligence (AI) techniques in wireless infrastructure, real-time collection and processing end-user devices is now high demand. It superlative to use AI detect predict pandemic colossal nature. Coronavirus disease 2019 (COVID-19) which originated Wuhan China has had disastrous effects on the global community overburdened advanced healthcare systems world. Globally; over 4 063 525 confirmed cases 282,244 deaths have been recorded as 11th May 2020 according European...

10.3389/fpubh.2020.00357 article EN cc-by Frontiers in Public Health 2020-07-03

Citrus fruit diseases have an egregious impact on both the quality and quantity of citrus production market. Automatic detection severity is essential for high-quality fruit. In current work, a dataset preprocessed by rescaling establishing bounding boxes with labeled image software. Then, selective search, which combines capabilities extensive search graph-based segmentation, applied. The proposed deep neural network (DNN) model trained to detect targeted areas disease its level using...

10.3390/electronics11030495 article EN Electronics 2022-02-08

Summary Recently Internet of Things (IoT) is being used in several fields like smart city, agriculture, weather forecasting, grids, waste management, etc. Even though IoT has huge potential applications, there are some areas for improvement. In the current work, we have concentrated on minimizing energy consumption sensors network that will lead to an increase lifetime. this optimize consumption, most appropriate Cluster Head (CH) chosen network. The proposed work makes use a hybrid...

10.1002/spe.2797 article EN Software Practice and Experience 2020-02-11

The world population is expected to grow by another two billion in 2050, according the survey taken Food and Agriculture Organization, while arable area likely only 5%. Therefore, smart efficient farming techniques are necessary improve agriculture productivity. land suitability assessment one of essential tools for development. Several new technologies innovations being implemented as an alternative collect process farm information. rapid development wireless sensor networks has triggered...

10.3390/s19173667 article EN cc-by Sensors 2019-08-23

Recent studies have shown that robust diets recommended to patients by Dietician or an Artificial Intelligent automated medical diet based cloud system can increase longevity, protect against further disease, and improve the overall quality of life. However, personnel are yet fully understand patient-dietician's rationale recommender system. This paper proposes a deep learning solution for health base dataset automatically detects which food should be given patient on disease other features...

10.1109/access.2020.2968537 article EN cc-by IEEE Access 2020-01-01

Despite the numerous and noticeable inherited gains of Mobile Cloud Computing (MCC) in healthcare, its growth is being hindered by privacy security challenges. Such issues require utmost urgent attention to realize full scale efficient usage. There a need secure Health Information worldwide, regionally, locally. To fully avail health services, it crucial put place demanded practices for prevention breaches vulnerabilities. Hence, this research deliberated on provide requirement-oriented...

10.1109/access.2021.3049564 article EN cc-by IEEE Access 2021-01-01

The functionality of the Internet is continually changing from Computers (IoC) to "Internet Things (IoT)". Most connected systems, called Cyber-Physical Systems (CPS), are formed integration numerous features such as humans and physical environment, smart objects, embedded devices infrastructure. There a few critical problems, security risks ethical issues that could affect IoT CPS. When every piece data device obtainable on network, hackers can obtain it utilise for different scams. In...

10.3390/s22031076 article EN cc-by Sensors 2022-01-29

Traffic problems continue to deteriorate because of increasing population in urban areas that rely on many modes transportation, the transportation infrastructure has achieved considerable strides last several decades. This led an increase congestion control difficulties, which directly affect citizens through air pollution, fuel consumption, traffic law breaches, noise accidents, and loss time. prediction is essential aspect intelligent system smart cities it helps reduce overall...

10.1109/tits.2022.3233801 article EN IEEE Transactions on Intelligent Transportation Systems 2023-01-09

There has been a sharp increase in liver disease globally, and many people are dying without even knowing that they have it. As result of its limited symptoms, it is extremely difficult to detect until the very last stage. In event early detection, patients can begin treatment earlier, thereby saving their lives. It become increasingly popular use ensemble learning algorithms since perform better than traditional machine algorithms. this context, paper proposes novel architecture based on...

10.3390/biomedicines11020581 article EN cc-by Biomedicines 2023-02-16

The unregulated proliferation of counterfeit news creation and dissemination that has been seen in recent years poses a constant threat to democracy. Fake articles have the power persuade individuals, leaving them perplexed. This scientometric study examined 569 documents from Scopus database between 2012 mid-2022 look for general research trends, publication citation structures, authorship collaboration patterns, bibliographic coupling, productivity patterns order identify fake using deep...

10.3390/electronics12040948 article EN Electronics 2023-02-14

Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, crypto-jacking, malware and phishing attacks now rampant. In this era of cyber warfare, the software industry is also growing with an increasing number being used in all domains life. This evolution has added to problems vendors users where they have prevent wide range attacks. Existing watermark detection solutions low rate software. order address issue, paper proposes novel blind Zero code based Watermark...

10.1109/access.2020.2988160 article EN cc-by IEEE Access 2020-01-01

The pursuit to spot abnormal behaviors in and out of a network system is what led known as intrusion detection systems for soft computing besides many researchers have applied machine learning around this area. Obviously, single classifier alone the classifications seems impossible control intruders. This limitation us perform dimensionality reduction by means correlation-based feature selection approach (CFS approach) addition refined ensemble model. paper aims improve Intrusion Detection...

10.3390/s20092559 article EN cc-by Sensors 2020-04-30

Abstract Wireless sensor network (WSN) is a collection of huge number autonomous nodes having capabilities such as sensing, processing, and manipulation. In any WSN, routing protocols are the backbone for performing all type tasks controlling, transmission packets in ubiquitous environment. this article, LEACH protocol with Levenberg‐Marquardt neural (LEACH‐LMNN) considered to analyze overall lifetime. The aim LEACH‐LMNN comprises two parts: selection cluster head node using LMNN approach...

10.1002/ett.3997 article EN Transactions on Emerging Telecommunications Technologies 2020-06-02

Recognizing human physical activities from streaming smartphone sensor readings is essential for the successful realization of a smart environment. Physical activity recognition one active research topics to provide users adaptive services using devices. Existing methods lack in providing fast and accurate activities. This paper proposes an approach recognize only2-axes accelerometer sensor. It also investigates effectiveness contribution each axis To implement our approach, data daily life...

10.3390/s20082216 article EN cc-by Sensors 2020-04-14

The study focuses on the artificial intelligence empowered road vehicle- train collision risk prediction assessment, which may lead to development of a vehicle-train avoidance system for unmanned railway level crossings. delimits itself around collisions at crossings single line rail-road sections. first objective revolves evaluation by frequency and severity model using Poisson Gamma-log regression techniques respectively. Another is modification factor implementation predicted factors,...

10.1109/access.2020.3002416 article EN cc-by IEEE Access 2020-01-01

Sybil security threat in vehicular ad hoc networks (VANETs) has attracted much attention recent times. The attacker introduces malicious nodes with multiple identities. As the roadside unit fails to synchronize its clock legitimate vehicles, unintended vehicles are identified, and therefore erroneous messages will be sent them. This paper proposes a novel biologically inspired spider-monkey time synchronization technique for large-scale VANETs boost packet delivery at minimized energy...

10.1109/access.2018.2864111 article EN cc-by-nc-nd IEEE Access 2018-01-01

The recent developments in fog computing architecture and cloud of things (CoT) technology includes data mining management artificial intelligence operations. However, one the major challenges this model is vulnerability to security threats cyber-attacks against layers. In such a scenario, each layers are susceptible different intimidations, including sensed (edge layer), processing (fog (layer), storage for public users (cloud). conventional mechanisms that currently use appear not be...

10.3390/electronics10172110 article EN Electronics 2021-08-30

The distributed cooperative offloading technique with wireless setting and power transmission provides a possible solution to meet the requirements of next-generation Multi-access Edge Computation (MEC). MEC is model which avails cloud computing aptitude smoothly compute data at edge largely dense network in nearness smart communicating devices (SCDs). This paper presents based on Lagrangian Suboptimal Convergent Offloading Algorithm (LSCCOA) for multi-access Internet Things (IoT) network. A...

10.1109/access.2020.2980196 article EN cc-by IEEE Access 2020-01-01

Coronavirus is a fatal disease that affects mammals and birds. Usually, this virus spreads in humans through aerial precipitation of any fluid secreted from the infected entity's body part. This type than other unpremeditated viruses. Meanwhile, another class coronavirus was developed December 2019, named Novel (2019-nCoV), first seen Wuhan, China. From January 23, 2020, number affected individuals rapidly increased Wuhan countries. research proposes system for classifying analyzing...

10.1007/s00530-021-00774-w article EN other-oa Multimedia Systems 2021-03-28
Coming Soon ...