EcoSMEAL: Energy Consumption with Optimization Strategy via a Secured Smart Monitor-Alert Ensemble
DOI:
https://doi.org/10.59247/jfsc.v3i3.319Keywords:
IoTs, Energy consumption, Smart Monitor, Alert Ensemble, Machine Learning, Energy OptimizationAbstract
The global demand for automation that seeks the efficient consumption and usage of energy via the adoption of embedded-fit management solutions that yield improved performance with reduced consumption has become the new norm. These explore sensor-based units in their own right with eco-friendly platforms that raise germane environmental, health, and consumption regulation(s) concerns that have today become a global issue, even when they proffer improved life standards that replace traditional solutions. Our study posits an embedded sensor design to observe environmental conditions associated with energy consumption by residential or home appliances. It utilizes a machine learning scheme and algorithm to analyze the total energy consumed by each appliance and delivers optimal consumption that reduces energy waste. The system was tested across multiple parameters and found to yield desired effectiveness, reliability, and efficiency. Our utilization of the ESP8266 and ThingSpeak is able to handle extensive inputs without significant delays or data losses. Results affirms the system ability to maintain stable performance even with more devices connected to the unit.
References
G. Sabrina, Y. Khawla, G. Sabrina, B. Mabrouk, Y. Tarek, and O. Khawla, “The role of smart homes in reducing electrical energy consumption: The experience of Saudi Arabia,” International Journal of Economic Perspectives, vol. 18, no. 2, pp. 504–523, 2024, https://ijeponline.org/index.php/journal/article/view/574.
A. O. Eboka et al., “Resolving Data Imbalance Using a Bi-Directional Long-Short Term Memory for Enhanced Diabetes Mellitus Detection,” Journal of Future Artificial Intelligence and Technologies, vol. 2, no. 1, pp. 95–109, 2025, https://doi.org/10.62411/faith.3048-3719-73.
et al., “WiSeCart: Sensor-based Smart-Cart with Self-Payment Mode to Improve Shopping Experience and Inventory Management,” Advances in Multidisciplinary & Scientific Research Journal Publications, vol. 10, no. 1, pp. 53–74, 2024, https://doi.org/10.22624/aims/sij/v10n1p7.
S. G. Jeong, Q. V. Do, and W. J. Hwang, “Short-term photovoltaic power forecasting based on hybrid quantum gated recurrent unit,” ICT Express, vol. 10, no. 3, pp. 608–613, 2024, https://doi.org/10.1016/j.icte.2023.12.005.
A. A. Ojugo and A. O. Eboka, “Modeling the Computational Solution of Market Basket Associative Rule Mining Approaches Using Deep Neural Network,” Digital Technologies, vol. 3, no. 1, pp. 1–8, 2018, https://doi.org/10.12691/dt-3-1-1.
C. C. Odiakaose et al., “Investigating Data Balancing Effects for Enhanced Behavioural Risk Detection in Cervical Cancer Using BiGRU: A Pilot Study,” NIPES - Journal of Science and Technology Research, vol. 7, no. 2, pp. 319–329, 2025, https://doi.org/10.37933/nipes/7.2.2025.24.
Y. Himeur, A. Alsalemi, F. Bensaali, and A. Amira, “A Novel Approach for Detecting Anomalous Energy Consumption Based on Micro-Moments and Deep Neural Networks,” Cognitive Computation, vol. 12, no. 6, pp. 1381–1401, 2020, https://doi.org/10.1007/s12559-020-09764-y.
A. O. Eboka et al., “Pilot study on deploying a wireless sensor-based virtual-key access and lock system for home and industrial frontiers,” International Journal of Informatics and Communication Technology, vol. 14, no. 1, pp. 287–297, 2025, https://doi.org/10.11591/ijict.v14i1.pp287-297.
P. A. Onoma et al., “Investigating an Anomaly-based Intrusion Detection via Tree-based Adaptive Boosting Ensemble,” Journal of Fuzzy Systems and Control, vol. 3, no. 1, pp. 90–97, 2025, https://doi.org/10.59247/jfsc.v3i1.279.
D. R. I. M. Setiadi, A. R. Muslikh, S. W. Iriananda, W. Warto, J. Gondohanindijo, and A. A. Ojugo, “Outlier Detection Using Gaussian Mixture Model Clustering to Optimize XGBoost for Credit Approval Prediction,” Journal of Computing Theories and Applications, vol. 2, no. 2, pp. 244–255, 2024, https://doi.org/10.62411/jcta.11638.
E. U. Omede, A. E. Edje, M. I. Akazue, H. Utomwen, and A. A. Ojugo, “IMANoBAS: An Improved Multi-Mode Alert Notification IoT-based Anti-Burglar Defense System,” Journal of Computing Theories and Applications, vol. 1, no. 3, pp. 273–283, 2024, https://doi.org/10.62411/jcta.9541.
Y. Ma, X. Chen, L. Wang, and J. Yang, “Study on Smart Home Energy Management System Based on Artificial Intelligence,” Journal of Sensors, vol. 2021, pp. 1–9, 2021, https://doi.org/10.1155/2021/9101453.
J. Tian, “The Rise and Bypassing of Streaming Media,” Advances in Economics, Management and Political Sciences, vol. 57, no. 1, pp. 189–195, 2024, https://doi.org/10.54254/2754-1169/57/20230731.
S. Sendra, L. García, J. Lloret, I. Bosch, and R. Vega-Rodríguez, “LoRaWAN network for fire monitoring in rural environments,” Electronics (Switzerland), vol. 9, no. 3, p. 531, 2020, https://doi.org/10.3390/electronics9030531.
C. C. Odiakaose et al., “Hypertension Detection via Tree-Based Stack Ensemble with SMOTE-Tomek Data Balance and XGBoost Meta-Learner,” Journal of Future Artificial Intelligence and Technologies, vol. 1, no. 3, pp. 269–283, 2024, https://doi.org/10.62411/faith.3048-3719-43.
Z. Ye, Z. O’neill, and F. Hu, “Hardware-based emulator with deep learning model for building energy control and prediction based on occupancy sensors’ data,” Information (Switzerland), vol. 12, no. 12, p. 499, 2021, https://doi.org/10.3390/info12120499.
E. V. Ugbotu et al., “Transfer Learning Using a CNN Fused Random Forest for SMS Spam Detection with Semantic Normalization of Text Corpus,” NIPES - Journal of Science and Technology Research, vol. 7, no. 2, pp. 371–382, 2025, https://doi.org/10.37933/nipes/7.2.2025.29.
T. C. Aghaunor et al., “Enhanced Scorch Occurrence Prediction in Foam Production via a Fusion SMOTE-Tomek Balanced Deep Learning Scheme,” NIPES - Journal of Science and Technology Research, vol. 7, no. 2, pp. 330–339, 2025, https://doi.org/10.37933/nipes/7.2.2025.25.
H. Jo and Y. I. Yoon, “Intelligent smart home energy efficiency model using artificial TensorFlow engine,” Human-centric Computing and Information Sciences, vol. 8, no. 1, p. 9, 2018, https://doi.org/10.1186/s13673-018-0132-y.
P. A. Onoma et al., “Voice-based Dynamic Time Warping Recognition Scheme for Enhanced Database Access Security,” Journal of Fuzzy Systems and Control, vol. 3, no. 1, pp. 81–89, 2025, https://doi.org/10.59247/jfsc.v3i1.293.
A. A. Ojugo, P. O. Ejeh, O. C. Christopher, A. O. Eboka, and F. U. Emordi, “Improved distribution and food safety for beef processing and management using a blockchain-tracer support framework,” International Journal of Informatics and Communication Technology, vol. 12, no. 3, pp. 205–213, 2023, https://doi.org/10.11591/ijict.v12i3.pp205-213.
A. A. Ojugo and C. O. Obruche, “Empirical Evaluation for Intelligent Predictive Models in Prediction of Potential Cancer Problematic Cases In Nigeria,” ARRUS Journal of Mathematics and Applied Science, vol. 1, no. 2, pp. 110–120, 2021, https://doi.org/10.35877/mathscience614.
B. Kizilkaya, E. Ever, H. Y. Yatbaz, and A. Yazici, “An Effective Forest Fire Detection Framework Using Heterogeneous Wireless Multimedia Sensor Networks,” ACM Transactions on Multimedia Computing, Communications and Applications, vol. 18, no. 2, pp. 1–21, 2022, https://doi.org/10.1145/3473037.
A. A. Ojugo and R. E. Yoro, “Computational Intelligence in Stochastic Solution for Toroidal N-Queen,” Progress in Intelligent Computing and Applications, vol. 1, no. 2, pp. 46–56, 2013, https://doi.org/10.4156/pica.vol2.issue1.4.
H. H. Zeineldin, Y. A. R. I. Mohamed, V. Khadkikar, and V. Ravikumar Pandi, “A protection coordination index for evaluating distributed generation impacts on protection for meshed distribution systems,” IEEE Transactions on Smart Grid, vol. 4, no. 3, pp. 1523–1532, 2013, https://doi.org/10.1109/TSG.2013.2263745.
M. Faheem, B. Raza, M. S. Bhutta, and S. H. H. Madni, “A blockchain-based resilient and secure framework for events monitoring and control in distributed renewable energy systems,” IET Blockchain, vol. 4, no. S1, pp. 644–658, 2024, https://doi.org/10.1049/blc2.12081.
M. Shoaran, B. A. Haghi, M. Taghavi, M. Farivar, and A. Emami-Neyestanak, “Energy-efficient classification for resource-constrained biomedical applications,” IEEE Journal on Emerging and Selected Topics in Circuits and Systems, vol. 8, no. 4, pp. 693–707, 2018, https://doi.org/10.1109/JETCAS.2018.2844733.
A. A. Ojugo, “Dependable Community-Cloud Framework for Smartphones,” American Journal of Networks and Communications, vol. 4, no. 4, p. 95, 2015, https://doi.org/10.11648/j.ajnc.20150404.13.
et al., “CoDuBoTeSS: A Pilot Study to Eradicate Counterfeit Drugs via a Blockchain Tracer Support System on the Nigerian Frontier,” Advances in Multidisciplinary & Scientific Research Journal Publications, vol. 10, no. 2, pp. 53–74, 2024, https://doi.org/10.22624/aims/bij/v10n1p6.
N. Rawat*, J. S. Sodhi, and R. K. Tyagi, “Deep Learning Methods for monitoring, detecting and measuring Deer Movements for Wildlife Conservation,” International Journal of Recent Technology and Engineering (IJRTE), vol. 8, no. 4, pp. 3303–3308, 2019, https://doi.org/10.35940/ijrte.d8076.118419.
E. A. Aworonye, R. A. Abere, R. E. Ako, B. Nwozor, and V. O. Geteloma, “IoT-Motion electric eye ensemble for reduced power consumption in automated homes,” FUPRE Journal of Scientific and Industrial Research, vol. 8, no. 2, pp. 128–142, 2024, https://journal.fupre.edu.ng/index.php/fjsir/article/view/279.
A. R. Muslikh, D. R. I. M. Setiadi, and A. A. Ojugo, “Rice disease recognition using transfer learning xception convolutional neural network,” Jurnal Teknik Informatika (Jutif), vol. 4, no. 6, pp. 1535–1540, Dec. 2023, https://doi.org/10.52436/1.jutif.2023.4.6.1529.
P. K. Nandi, T. Tabassum, and M. Ahmad, “Development of an IoT-Based Automatic Remote Health Monitoring System,” Journal of Engineering Science, vol. 14, no. 2, pp. 21–30, 2024, https://doi.org/10.3329/jes.v14i2.71212.
D. A. Sungheetha and D. R. Sharma R, “Real Time Monitoring and Fire Detection using Internet of Things and Cloud based Drones,” Journal of Soft Computing Paradigm, vol. 2, no. 3, pp. 168–174, 2020, https://doi.org/10.36548/jscp.2020.3.004.
A. A. Ojugo, A. O. Eboka, R. E. Yoro, M. O. Yerokun, and F. N. Efozia, “Framework design for statistical fraud detection,” Mathematics and Computers in Science and Engineering Series, vol. 50, pp. 176–182, 2015, https://www.inase.org/library/2015/books/bypaper/MCSI/MCSI-33.pdf.
A. A. Ojugo, E. Ugboh, C. C. Onochie, A. O. Eboka, M. O. Yerokun, and I. J. Iyawa, “Effects of Formative Test and Attitudinal Types on Students’ Achievement in Mathematics in Nigeria,” African Educational Research Journal, vol. 1, no. 2, pp. 113–117, 2013, https://eric.ed.gov/?id=EJ1216962.
A. A. Ojugo and R. E. Yoro, “Migration Pattern As Threshold Parameter In The Propagation of The Covid-19 Epidemic Using An Actor-Based Model for SI-Social Graph,” JINAV: Journal of Information and Visualization, vol. 2, no. 2, pp. 93–105, 2021, https://doi.org/10.35877/454ri.jinav379.
S. N. Okofu et al., “Pilot Study on Consumer Preference, Intentions and Trust on Purchasing-Pattern for Online Virtual Shops,” International Journal of Advanced Computer Science and Applications, vol. 15, no. 7, pp. 804–811, 2024, https://doi.org/10.14569/IJACSA.2024.0150780.
S. A. Aessa, E. H. Ali, S. W. Shneen, and L. H. Abood, “Adaptive Fuzzy Filter Technique for Mixed Noise Removing from Sonar Images Underwater,” Journal of Fuzzy Systems and Control, vol. 2, no. 2, pp. 45–49, 2024, https://doi.org/10.59247/jfsc.v2i2.176.
S. U. Okperigho, B. Nwozor, and V. O. Geteloma, “Deployment of an IoT Storage Tank Gauge and Monitor,” FUPRE Journal of Scientific and Industrial Research (FJSIR), vol. 8, no. 1, pp. 55–68, 2024, [Online]. Available: https://journal.fupre.edu.ng/index.php/fjsir/article/view/252.
D.-A.-Q. Nguyen et al., “Adaptive Evaluation of LQR Control using Particle Swarm Optimization for Pendubot,” Journal of Fuzzy Systems and Control, vol. 2, no. 2, pp. 58–66, 2024, https://doi.org/10.59247/jfsc.v2i2.203.
V. O. Geteloma et al., “AQuamoAS: unmasking a wireless sensor-based ensemble for air quality monitor and alert system,” Applied Engineering and Technology, vol. 3, no. 2, pp. 70–85, 2024, https://doi.org/10.31763/aet.v3i2.1409.
R. E. Yoro and A. A. Ojugo, “An Intelligent Model Using Relationship in Weather Conditions to Predict Livestock-Fish Farming Yield and Production in Nigeria,” American Journal of Modeling and Optimization, vol. 7, no. 2, pp. 35–41, 2019, https://doi.org/10.12691/ajmo-7-2-1.
A. A. Ojugo et al., “CoSoGMIR: A Social Graph Contagion Diffusion Framework using the Movement-Interaction-Return Technique,” Journal of Computing Theories and Applications, vol. 1, no. 2, pp. 163–173, 2023, https://doi.org/10.33633/jcta.v1i2.9355.
A. D. Bhavani and N. Mangla, “A Novel Network Intrusion Detection System Based on Semi-Supervised Approach for IoT,” International Journal of Advanced Computer Science and Applications, vol. 14, no. 4, pp. 207–216, 2023, https://doi.org/10.14569/IJACSA.2023.0140424.
W. L. Hsu, J. Y. Jhuang, C. S. Huang, C. K. Liang, and Y. C. Shiau, “Application of Internet of Things in a kitchen fire prevention system,” Applied Sciences (Switzerland), vol. 9, no. 17, p. 3520, 2019, https://doi.org/10.3390/app9173520.
K. Okeke and S. Omojola, “Enhancing Cybersecurity Measures in Critical Infrastructure: Challenges and Innovations for Resilience,” Journal of Scientific Research and Reports, vol. 31, no. 2, pp. 474–484, 2025, https://doi.org/10.9734/jsrr/2025/v31i22868.
K. Muhamada, D. R. I. M. Setiadi, U. Sudibyo, B. Widjajanto, and A. A. Ojugo, “Exploring Machine Learning and Deep Learning Techniques for Occluded Face Recognition: A Comprehensive Survey and Comparative Analysis,” Journal of Future Artificial Intelligence and Technologies, vol. 1, no. 2, pp. 160–173, 2024, https://doi.org/10.62411/faith.2024-30.
A. A. Ojugo, “Predicting Behavioural Evolution on a Graph-Based Model,” Advances in Networks, vol. 3, no. 2, p. 8, 2015, https://doi.org/10.11648/j.net.20150302.11.
N. R. Pratama, D. R. I. M. Setiadi, I. Harkespan, and A. A. Ojugo, “Feature Fusion with Albumentation for Enhancing Monkeypox Detection Using Deep Learning Models,” Journal of Computing Theories and Applications, vol. 2, no. 3, pp. 427–440, 2025, https://doi.org/10.62411/jcta.12255.
L. R. Zuama, D. R. I. M. Setiadi, A. Susanto, S. Santosa, H.-S. Gan, and A. A. Ojugo, “High-Performance Face Spoofing Detection using Feature Fusion of FaceNet and Tuned DenseNet201,” Journal of Future Artificial Intelligence and Technologies, vol. 1, no. 4, pp. 385–400, 2025, https://doi.org/10.62411/faith.3048-3719-62.
D. R. I. Moses Setiadi et al., “Single Qubit Quantum Logistic-Sine XYZ-Rotation Maps: An Ultra-Wide Range Dynamics for Image Encryption,” Computers, Materials and Continua, vol. 83, no. 2, pp. 2161–2188, 2025, https://doi.org/10.32604/cmc.2025.063729.
R. E. Ako et al., “Effects of Data Resampling on Predicting Customer Churn via a Comparative Tree-based Random Forest and XGBoost,” Journal of Computing Theories and Applications, vol. 2, no. 1, pp. 86–101, 2024, https://doi.org/10.62411/jcta.10562.
F. O. Aghware et al., “Enhancing the Random Forest Model via Synthetic Minority Oversampling Technique for Credit-Card Fraud Detection,” Journal of Computing Theories and Applications, vol. 1, no. 4, pp. 407–420, 2024, https://doi.org/10.62411/jcta.10323.
A. A. Ojugo and D. A. Oyemade, “Predicting Diffusion Dynamics Of The Coronavirus In Nigeria Through Ties-Strength Threshold On A Cascading SI-Graph,” Technology Reports of Kansai University, vol. 62, no. 08, pp. 126–132, 2020, https://doi.org/TRKU-13-08-2020-10998.
M. Oulhazzan, D. Saifaoui, S. Ettami, and A. Lilane, “Design and development of small-scale linear Fresnel solar concentrator for medium temperature applications,” Materials Today: Proceedings, vol. 30, pp. 1013–1020, 2019, https://doi.org/10.1016/j.matpr.2020.04.380.
et al., “Quest for Empirical Solution to Runoff Prediction in Nigeria via Random Forest Ensemble: Pilot Study,” Advances in Multidisciplinary & Scientific Research Journal Publications, vol. 10, no. 1, pp. 73–90, 2024, https://doi.org/10.22624/aims/bhi/v10n1p8.
M. I. Akazue et al., “Handling Transactional Data Features via Associative Rule Mining for Mobile Online Shopping Platforms,” International Journal of Advanced Computer Science and Applications, vol. 15, no. 3, pp. 530–538, 2024, https://doi.org/10.14569/IJACSA.2024.0150354.
E. O. Okonta, A. A. Ojugo, U. R. Wemembu, and D. Ajani, “Embedding Quality Function Deployment In Software Development: A Novel Approach,” West African Journal of Industrial & Academic Research, vol. 6, no. 1, pp. 50–64, 2013, https://scispace.com/pdf/embedding-quality-function-deployment-in-software-1nkax6lobk.pdf.
M. D. Okpor et al., “Pilot study on enhanced detection of cues over malicious sites using data balancing on the random forest ensemble,” Journal of Future Artificial Intelligence and Technologies, vol. 1, no. 2, pp. 109–123, 2024, https://doi.org/10.62411/faith.2024-14.
D. W. S. L. Jebarani*, S. G J, and K. B, “Conservation of Energy using Object Detection Model,” International Journal of Innovative Technology and Exploring Engineering, vol. 9, no. 8, pp. 29–33, 2020, https://doi.org/10.35940/ijitee.h6435.069820.
A. Mosavi and A. Bahmani, “Energy consumption prediction using machine learning; a review,” Energies, no. March, pp. 1–63, 2019, https://doi.org/10.20944/preprints201903.0131.v1.
M. I. Akazue et al., “FiMoDeAL: pilot study on shortest path heuristics in wireless sensor network for fire detection and alert ensemble,” Bulletin of Electrical Engineering and Informatics, vol. 13, no. 5, pp. 3534–3543, 2024, https://doi.org/10.11591/eei.v13i5.8084.
C. Stolojescu-Crisan, C. Crisan, and B. P. Butunoi, “An iot-based smart home automation system,” Sensors, vol. 21, no. 11, p. 3784, 2021, https://doi.org/10.3390/s21113784.
H. Alqourabah, A. Muneer, and S. M. Fati, “A smart fire detection system using IoT technology with automatic water sprinkler,” International Journal of Electrical and Computer Engineering, vol. 11, no. 4, pp. 2994–3002, 2021, https://doi.org/10.11591/ijece.v11i4.pp2994-3002.
F. O. Aghware et al., “Effects of Data Balancing in Diabetes Mellitus Detection: A Comparative XGBoost and Random Forest Learning Approach,” NIPES - Journal of Science and Technology Research, vol. 7, no. 1, pp. 1–11, 2025, https://doi.org/10.37933/nipes/7.1.2025.1.
A. P. Binitie et al., “Stacked Learning Anomaly Detection Scheme with Data Augmentation for Spatiotemporal Traffic Flow,” Journal of Fuzzy Systems and Control, vol. 2, no. 3, pp. 203–214, 2024, https://doi.org/10.59247/jfsc.v2i3.267.
N. Rashid, B. U. Demirel, and M. Abdullah Al Faruque, “AHAR: Adaptive CNN for Energy-Efficient Human Activity Recognition in Low-Power Edge Devices,” IEEE Internet of Things Journal, vol. 9, no. 15, pp. 13041–13051, 2022, https://doi.org/10.1109/JIOT.2022.3140465.
K. Saritha, “Energy Monitoring and Theft System using IoT,” International Journal for Research in Applied Science and Engineering Technology, vol. 8, no. 6, pp. 1705–1711, 2020, https://doi.org/10.22214/ijraset.2020.6278.
M. Zekić-Sušac, S. Mitrović, and A. Has, “Machine learning based system for managing energy efficiency of public sector as an approach towards smart cities,” International Journal of Information Management, vol. 58, p. 102074, 2021, https://doi.org/10.1016/j.ijinfomgt.2020.102074.
D. R. I. M. Setiadi, K. Nugroho, A. R. Muslikh, S. W. Iriananda, and A. A. Ojugo, “Integrating SMOTE-Tomek and Fusion Learning with XGBoost Meta-Learner for Robust Diabetes Recognition,” Journal of Future Artificial Intelligence and Technologies, vol. 1, no. 1, pp. 23–38, 2024, https://doi.org/10.62411/faith.2024-11.
V. V. Krishna, Y. Rupa, G. Koushik, T. Varun, B. V. Kiranmayee, and K. Akhil, “A Comparative Study on Authentication Vulnerabilities and Security Issues in Wearable Devices,” in Proceedings of the Fourth International Conference on Advanced Computer Engineering and Communication Systems (ICACECS 2023), 2023, vol. 18, no. Icacecs, pp. 106–116. https://doi.org/10.2991/978-94-6463-314-6_11.
D. A. Oyemade and A. A. Ojugo, “A Property Oriented Pandemic Surviving Trading Model,” International Journal of Advanced Trends in Computer Science and Engineering, vol. 9, no. 5, pp. 7397–7404, 2020, https://doi.org/10.30534/ijatcse/2020/71952020.
H. T. Wen, H. Y. Wu, and K. C. Liao, “Using XGBoost Regression to Analyze the Importance of Input Features Applied to an Artificial Intelligence Model for the Biomass Gasification System,” Inventions, vol. 7, no. 4, p. 126, 2022, https://doi.org/10.3390/inventions7040126.
F. A.-A. Imouokhome, “A Three Tier Learning Model for Universities in Nigeria,” Journal of Technologies in Society, vol. 12, no. 2, pp. 9–20, 2016, https://doi.org/10.18848/2381-9251/cgp/v12i02/9-20.
J. Govea, W. Gaibor-Naranjo, and W. Villegas-Ch, “Securing Critical Infrastructure with Blockchain Technology: An Approach to Cyber-Resilience,” Computers, vol. 13, no. 5, p. 122, 2024, https://doi.org/10.3390/computers13050122.
R. E. Yoro et al., “Adaptive DDoS detection mode in software-defined SIP-VoIP using transfer learning with boosted meta-learner,” Plos One, vol. 20, no. 6 June, p. e0326571, 2025, https://doi.org/10.1371/journal.pone.0326571.
B. O. Malasowe, F. O. Aghware, M. D. Okpor, E. B. Edim, R. E. Ako, and A. A. Ojugo, “Techniques and Best Practices for Handling Cybersecurity Risks in Educational Technology Environment (EdTech),” NIPES - Journal of Science and Technology Research, vol. 6, no. 2, pp. 293–311, 2024, https://doi.org/10.5281/zenodo.12617068.
I. E.I., A. M.I., O. Edith, and O. Deborah, “A Framework for Smart City Model Enabled by Internet of Things (IoT),” International Journal of Computer Applications, vol. 185, no. 6, pp. 6–11, 2023, https://doi.org/10.5120/ijca2023922685.
et al., “Assessing the Influence of Cybersecurity Threats and Risks on the Adoption and Growth of Digital Banking: a Systematic Literature Review,” American Journal of Advanced Technology and Engineering Solutions, vol. 1, no. 01, pp. 226–257, 2025, https://doi.org/10.63125/fh49gz18.
T. Muralidharan and N. Nissim, “Improving malicious email detection through novel designated deep-learning architectures utilizing entire email,” Neural Networks, vol. 157, pp. 257-279, 2023, https://doi.org/10.1016/j.neunet.2022.09.002.
L. Erhan et al., “Smart anomaly detection in sensor systems: A multi-perspective review,” Information Fusion, vol. 67, pp. 64–79, 2021, https://doi.org/10.1016/j.inffus.2020.10.001.
A. O. Eboka and A. A. Ojugo, “Mitigating technical challenges via redesigning campus network for greater efficiency, scalability and robustness: A logical view,” International Journal of Modern Education and Computer Science, vol. 12, no. 6, pp. 29–45, 2020, https://doi.org/10.5815/ijmecs.2020.06.03.
V. O. Geteloma et al., “Enhanced data augmentation for predicting consumer churn rate with monetization and retention strategies: a pilot study,” Applied Engineering and Technology, vol. 3, no. 1, pp. 35–51, 2024, https://doi.org/10.31763/aet.v3i1.1408.
A. A. Ojugo, C. O. Obruche, and A. O. Eboka, “Quest For Convergence Solution Using Hybrid Genetic Algorithm Trained Neural Network Model For Metamorphic Malware Detection,” ARRUS Journal of Engineering and Technology, vol. 2, no. 1, pp. 12–23, 2021, https://doi.org/10.35877/jetech613.
Nur Syahrina Binti Juni, Grasila Huney Wan, Siti Aisyah Nabilah Binti Banchi, Estella Blessings, Venetha A/P Loganathan, and Muhammad Faisal, “Advancements in Multi-Factor Authentication: A Quantum-Resilient and Federated Approach for Enhanced Security,” International Journal of Computer Technology and Science, vol. 1, no. 3, pp. 71–86, 2024, https://doi.org/10.62951/ijcts.v1i3.26.
A. A. Ojugo and R. E. Yoro, “An Intelligent Lightweight Market Basket Associative Rule Mining for Smartphone Cloud-Based Application To Ease Banking Transaction,” Advances in Multidisciplinary & Scientific Research Journal Publication, vol. 4, no. 3, pp. 23–34, 2018, https://doi.org/10.22624/aims/v4n3p4.
Raed Abdulkareem Hasan, Mustafa Mahmood Akawee, and Tole Sutikno, “Improved GIS-T model for finding the shortest paths in graphs,” Babylonian Journal of Machine Learning, vol. 2023, pp. 7–16, 2023, https://doi.org/10.58496/bjml/2023/002.
A. A. Ojugo and O. Nwankwo, “forging a spectral-clustering multi-agent hybrid deep learning model to predict rainfall runoff in Nigeria,” International Journal of Innovative Science, Engineering and Technology, vol. 8, no. 3, pp. 140–147, 2021, https://ijiset.com/vol8/v8s3/IJISET_V8_I03_18.pdf.
Obasuyi, D.A. et al., “NiCuSBlockIoT: Sensor-based Cargo Assets Management and Traceability Blockchain Support for Nigerian Custom Services,” Advances in Multidisciplinary & Scientific Research Journal Publications, vol. 15, no. 2, pp. 45–64, 2024, https://doi.org/10.22624/aims/cisdi/v15n2p4.
R. R. Atuduhor et al., “StreamBoostE: A hybrid boosting-collaborative filter scheme for adaptive user-item recommender for streaming services,” Advances in Multidisciplinary & Scientific Research Journal Publications, vol. 10, no. 2, pp. 89–106, 2024, https://doi.org/10.22624/aims/v10n2p8.
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Tabitha Chukwudi Aghaunor, Joy Agboi, Eferhire Valentine Ugbotu, Paul Avweresuoghene Onoma, Arnold Adimabua Ojugo, Christopher Chukwufunaya Odiakaose, Andrew Okonji Eboka, Peace Oguguo Ezzeh, Victor Ochuko Geteloma, Amaka Patience Binitie, Anderson Ise Orobor, Blessing Uche Nwozor, Patrick Ogholuwarami Ejeh, Christopher Chukwudi Onochie

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.