dblp: Celestine Iwendi
https://dblp.org/pid/226/9439.html
dblp person page RSS feedTue, 03 Dec 2024 20:31:11 +0100en-USdaily1released under the CC0 1.0 licensedblp@dagstuhl.de (dblp team)dblp@dagstuhl.de (dblp team)Computers/Computer_Science/Publications/Bibliographieshttp://www.rssboard.org/rss-specificationhttps://dblp.org/img/logo.144x51.pngdblp: Celestine Iwendihttps://dblp.org/pid/226/9439.html14451Quantum Computing Integrated Patterns for Real-Time Cryptography in Assorted Domains.https://doi.org/10.1109/ACCESS.2024.3401162Shally Nagpal, Shivani Gaba, Ishan Budhiraja, Meenakshi Sharma, Akansha Singh, Krishna Kant Singh, S. Sameh Aksar, Mohamed Abouhawwash, Celestine Iwendi: Quantum Computing Integrated Patterns for Real-Time Cryptography in Assorted Domains.IEEE Access12: 132317-132331 (2024)]]>https://dblp.org/rec/journals/access/NagpalGBSSSAAI24Mon, 01 Jan 2024 00:00:00 +0100Performance Optimization of Software-Defined Industrial Internet-of-Things (SD-IIoT).https://doi.org/10.1109/ACCESS.2024.3466186Jehad Ali, Celestine Iwendi, Gaoyang Shan, Hsiao-Chun Wu, Mohammed J. F. Alenazi, Zaid Bin Faheem, Cresantus Biamba: Performance Optimization of Software-Defined Industrial Internet-of-Things (SD-IIoT).IEEE Access12: 169659-169670 (2024)]]>https://dblp.org/rec/journals/access/AliISWAFB24Mon, 01 Jan 2024 00:00:00 +0100CIA Security for Internet of Vehicles and Blockchain-AI Integration.https://doi.org/10.1007/s10723-024-09757-3Tao Hai, Muammer Aksoy, Celestine Iwendi, Ebuka Ibeke, Senthilkumar Mohan: CIA Security for Internet of Vehicles and Blockchain-AI Integration.J. Grid Comput.22(2): 43 (2024)]]>https://dblp.org/rec/journals/grid/HaiAIIM24Sat, 01 Jun 2024 01:00:00 +0200A machine learning model for Alzheimer's disease prediction.https://doi.org/10.1049/cps2.12090Pooja Rani, Rohit Lamba, Ravi Kumar Sachdeva, Karan Kumar, Celestine Iwendi: A machine learning model for Alzheimer's disease prediction.IET Cyper-Phys. Syst.: Theory & Appl.9(2): 125-134 (2024)]]>https://dblp.org/rec/journals/iet-cps/RaniLSKI24Sat, 01 Jun 2024 01:00:00 +0200Feature subset selection using heuristic and metaheuristic approaches for diabetes prediction on a binary encoded dataset.https://doi.org/10.1142/S1793962324500314Puneet Kumar, Bhoopesh Singh Bhati, Rajesh Kumar Dhanaraj, Celestine Iwendi, Balamurugan Balusamy, Nitesh Singh Bhati, Prerana Rai: Feature subset selection using heuristic and metaheuristic approaches for diabetes prediction on a binary encoded dataset.Int. J. Model. Simul. Sci. Comput.15(3): 2450031:1-2450031:24 (2024)]]>https://dblp.org/rec/journals/ijmssc/KumarBDIBBR24Sat, 01 Jun 2024 01:00:00 +0200A systematic review on blockchain-based access control systems in cloud environment.https://doi.org/10.1186/s13677-024-00697-7Aarti Punia, Preeti Gulia, Nasib Singh Gill, Ebuka Ibeke, Celestine Iwendi, Piyush Kumar Shukla: A systematic review on blockchain-based access control systems in cloud environment.J. Cloud Comput.13(1): 146 (2024)]]>https://dblp.org/rec/journals/jcloudc/PuniaGGIIS24Sun, 01 Dec 2024 00:00:00 +0100Federated recurrent-based adaptive battle royale algorithm for privacy-preserving data aggregation in industrial IoT: a signal, image, and video processing perspective.https://doi.org/10.1007/s11760-024-03081-9G. Jagadeesh, M. Pounambal, K. ArivuSelvan, E. Sathiyamoorthy, J. Vellingiri, V. Madhu Viswanatham, Celestine Iwendi: Federated recurrent-based adaptive battle royale algorithm for privacy-preserving data aggregation in industrial IoT: a signal, image, and video processing perspective.Signal Image Video Process.18(5): 4395-4406 (2024)]]>https://dblp.org/rec/journals/sivp/JagadeeshPASVVI24Mon, 01 Jul 2024 01:00:00 +0200MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment.https://doi.org/10.1007/s11227-023-05809-9G. Jagadeesh, J. Gitanjali, J. Vellingiri, M. Pounambal, E. Sathiyamoorthy, Celestine Iwendi: MDROGWL: modified deep reinforcement oppositional wolf learning for group key management in IoT environment.J. Supercomput.80(8): 10223-10254 (2024)]]>https://dblp.org/rec/journals/tjs/JagadeeshGVPSI24Wed, 01 May 2024 01:00:00 +0200Empowering Marketing Management and Gaming Consumer Interaction Through AI and Citizen Science.https://doi.org/10.1109/GEM61861.2024.10585727Celestine Iwendi, Chatti Subba Lakshmi, Bala Dhandayuthapani Veerasamy, Paul Hollins, Damilare Adeola, Pradeep Hewage, Adedapo Paul Aderemi, Piyush Kumar Shukla: Empowering Marketing Management and Gaming Consumer Interaction Through AI and Citizen Science.GEM2024: 1-6]]>https://dblp.org/rec/conf/gamesem/IwendiLVHAHAS24Mon, 01 Jan 2024 00:00:00 +0100Exploring the Concept of Mini Data Sprints as a Methodology to Assess Data Validity and Stimulate Climate Conversation.https://doi.org/10.1109/GEM61861.2024.10585427Paul W. L. Watson, Katharina Koller, Celestine Iwendi, Claudia Magdalena Fabian, Paul Hollins, Barbara Kieslinger: Exploring the Concept of Mini Data Sprints as a Methodology to Assess Data Validity and Stimulate Climate Conversation.GEM2024: 1-6]]>https://dblp.org/rec/conf/gamesem/WatsonKIFHK24Mon, 01 Jan 2024 00:00:00 +0100Secure Supervised Learning-Based Smart Home Authentication Framework.https://doi.org/10.48550/arXiv.2402.00568K. Swapna Sudha, N. Jeyanthi, Celestine Iwendi: Secure Supervised Learning-Based Smart Home Authentication Framework.CoRRabs/2402.00568 (2024)]]>https://dblp.org/rec/journals/corr/abs-2402-00568Mon, 01 Jan 2024 00:00:00 +0100Service Level Agreement Monitoring as a Service: An Independent Monitoring Service for Service Level Agreements in Clouds.https://doi.org/10.1089/big.2021.0274Afzal Badshah, Ateeqa Jalal, Umar Farooq, Ghani Ur Rehman, Shahab S. Band, Celestine Iwendi: Service Level Agreement Monitoring as a Service: An Independent Monitoring Service for Service Level Agreements in Clouds.Big Data11(5): 339-354 (2023)]]>https://dblp.org/rec/journals/bigdata/BadshahJFRBI23Sun, 01 Oct 2023 01:00:00 +0200SVM-based generative adverserial networks for federated learning and edge computing attack model and outpoising.https://doi.org/10.1111/exsy.13072Poongodi Manoharan, Ranjan Walia, Celestine Iwendi, Tariq Ahamed Ahanger, S. T. Suganthi, M. M. Kamruzzaman, Sami Bourouis, Wajdi Alhakami, Mounir Hamdi: SVM-based generative adverserial networks for federated learning and edge computing attack model and outpoising.Expert Syst. J. Knowl. Eng.40(5) (2023)]]>https://dblp.org/rec/journals/es/ManoharanWIASKBAH23Thu, 01 Jun 2023 01:00:00 +0200Blockchain-based multi-layered federated extreme learning networks in connected vehicles.https://doi.org/10.1111/exsy.13222Durga Rajan, Poovammal Eswaran, Gautam Srivastava, Kadiyala Ramana, Celestine Iwendi: Blockchain-based multi-layered federated extreme learning networks in connected vehicles.Expert Syst. J. Knowl. Eng.40(6) (2023)]]>https://dblp.org/rec/journals/es/RajanESRI23Sat, 01 Jul 2023 01:00:00 +0200Blockchain-inspired lightweight trust-based system in vehicular networks.https://doi.org/10.1002/nem.2226Sandeep Kumar Arora, Gulshan Kumar, Mustapha Hedabou, El Mehdi Amhoud, Celestine Iwendi: Blockchain-inspired lightweight trust-based system in vehicular networks.Int. J. Netw. Manag.33(5) (2023)]]>https://dblp.org/rec/journals/ijnm/AroraKHAI23Fri, 01 Sep 2023 01:00:00 +0200Exploratory data analysis, classification, comparative analysis, case severity detection, and internet of things in COVID-19 telemonitoring for smart hospitals.https://doi.org/10.1080/0952813x.2021.1960634Aysha Shabbir, Maryam Shabbir, Abdul Rehman Javed, Muhammad Rizwan, Celestine Iwendi, Chinmay Chakraborty: Exploratory data analysis, classification, comparative analysis, case severity detection, and internet of things in COVID-19 telemonitoring for smart hospitals.J. Exp. Theor. Artif. Intell.35(4): 507-534 (2023)]]>https://dblp.org/rec/journals/jetai/ShabbirSJRIC23Mon, 01 May 2023 01:00:00 +0200Cyberbullying detection solutions based on deep learning architectures.https://doi.org/10.1007/s00530-020-00701-5Celestine Iwendi, Gautam Srivastava, Suleman Khan, Praveen Kumar Reddy Maddikunta: Cyberbullying detection solutions based on deep learning architectures.Multim. Syst.29(3): 1839-1852 (2023)]]>https://dblp.org/rec/journals/mms/IwendiSKM23Thu, 01 Jun 2023 01:00:00 +0200A Vision Transformer Approach for Traffic Congestion Prediction in Urban Areas.https://doi.org/10.1109/TITS.2022.3233801Kadiyala Ramana, Gautam Srivastava, Madapuri Rudra Kumar, Thippa Reddy Gadekallu, Jerry Chun-Wei Lin, Mamoun Alazab, Celestine Iwendi: A Vision Transformer Approach for Traffic Congestion Prediction in Urban Areas.IEEE Trans. Intell. Transp. Syst.24(4): 3922-3934 (2023)]]>https://dblp.org/rec/journals/tits/RamanaSKGLAI23Sat, 01 Apr 2023 01:00:00 +0200Use of regional computing to minimize the social big data effects.https://doi.org/10.1016/j.cie.2022.108433Afzal Badshah, Celestine Iwendi, Ateeqa Jalal, Syed Shabih Ul Hasan, Ghawar Said, Shahab S. Band, Arthur Chang: Use of regional computing to minimize the social big data effects.Comput. Ind. Eng.171: 108433 (2022)]]>https://dblp.org/rec/journals/candie/BadshahIJHSBC22Sat, 01 Jan 2022 00:00:00 +0100Covid-19 fake news sentiment analysis.https://doi.org/10.1016/j.compeleceng.2022.107967Celestine Iwendi, Senthilkumar Mohan, Suleman Khan, Ebuka Ibeke, Ali Ahmadian, Tiziana Ciano: Covid-19 fake news sentiment analysis.Comput. Electr. Eng.101: 107967 (2022)]]>https://dblp.org/rec/journals/cee/IwendiMKIAC22Sat, 01 Jan 2022 00:00:00 +0100Building construction based on video surveillance and deep reinforcement learning using smart grid power system.https://doi.org/10.1016/j.compeleceng.2022.108273Khalid M. Alhamed, Celestine Iwendi, Ashit Kumar Dutta, Badr Almutairi, Hisham Alsaghier, Sultan Almotairi: Building construction based on video surveillance and deep reinforcement learning using smart grid power system.Comput. Electr. Eng.103: 108273 (2022)]]>https://dblp.org/rec/journals/cee/AlhamedIDAAA22Sat, 01 Jan 2022 00:00:00 +0100AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems.https://doi.org/10.1016/j.comcom.2021.09.029Sohaib A. Latif, Fang B. Xian Wen, Celestine Iwendi, Li-li F. Wang, Syed Muhammad Mohsin, Zhaoyang Han, Shahab S. Band: AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems.Comput. Commun.181: 274-283 (2022)]]>https://dblp.org/rec/journals/comcom/LatifWIWMHB22Sat, 01 Jan 2022 00:00:00 +0100A futuristic approach to generate random bit sequence using dynamic perturbed chaotic system.https://doi.org/10.3906/elk-2010-137Sathya Krishnamoorthi, Premalatha Jayapaul, Vani Rajasekar, Rajesh Kumar Dhanaraj, Celestine Iwendi: A futuristic approach to generate random bit sequence using dynamic perturbed chaotic system.Turkish J. Electr. Eng. Comput. Sci.30(1): 35-49 (2022)]]>https://dblp.org/rec/journals/elektrik/KrishnamoorthiJRDI22Sat, 01 Jan 2022 00:00:00 +0100Identification of malnutrition and prediction of BMI from facial images using real-time image processing and machine learning.https://doi.org/10.1049/ipr2.12222Dhanamjayulu Chittathuru, Nizhal U. N., Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu, Celestine Iwendi, Chuliang Wei, Qin Xin: Identification of malnutrition and prediction of BMI from facial images using real-time image processing and machine learning.IET Image Process.16(3): 647-658 (2022)]]>https://dblp.org/rec/journals/iet-ipr/ChittathuruNMGI22Sat, 01 Jan 2022 00:00:00 +0100Pointer-Based Item-to-Item Collaborative Filtering Recommendation System Using a Machine Learning Model.https://doi.org/10.1142/S0219622021500619Celestine Iwendi, Ebuka Ibeke, Harshini Eggoni, Sreerajavenkatareddy Velagala, Gautam Srivastava: Pointer-Based Item-to-Item Collaborative Filtering Recommendation System Using a Machine Learning Model.Int. J. Inf. Technol. Decis. Mak.21(1): 463-484 (2022)]]>https://dblp.org/rec/journals/ijitdm/IwendiIEVS22Sat, 01 Jan 2022 00:00:00 +0100A Secure Multiuser Privacy Technique for Wireless IoT Networks Using Stochastic Privacy Optimization.https://doi.org/10.1109/JIOT.2021.3050755Joseph Henry Anajemba, Tang Yue, Celestine Iwendi, Pushpita Chatterjee, Desire Ngabo, Waleed S. Alnumay: A Secure Multiuser Privacy Technique for Wireless IoT Networks Using Stochastic Privacy Optimization.IEEE Internet Things J.9(4): 2566-2577 (2022)]]>https://dblp.org/rec/journals/iotj/AnajembaYICNA22Sat, 01 Jan 2022 00:00:00 +0100Optimal Coordination of PSS and SSSC Controllers in Power System Using Ant Colony Optimization Algorithm.https://doi.org/10.1142/S0218126622500608Mehrdad Ahmadi Kamarposhti, Ilhami Colak, Celestine Iwendi, Shahab S. Band, Ebuka Ibeke: Optimal Coordination of PSS and SSSC Controllers in Power System Using Ant Colony Optimization Algorithm.J. Circuits Syst. Comput.31(4): 2250060:1-2250060:20 (2022)]]>https://dblp.org/rec/journals/jcsc/KamarposhtiCIBI22Sat, 01 Jan 2022 00:00:00 +0100Classification of COVID-19 individuals using adaptive neuro-fuzzy inference system.https://doi.org/10.1007/s00530-021-00774-wCelestine Iwendi, Kainaat Mahboob, Zarnab Khalid, Abdul Rehman Javed, Muhammad Rizwan, Uttam Ghosh: Classification of COVID-19 individuals using adaptive neuro-fuzzy inference system.Multim. Syst.28(4): 1223-1237 (2022)]]>https://dblp.org/rec/journals/mms/IwendiMKJRG22Sat, 01 Jan 2022 00:00:00 +0100A novel unsupervised ensemble framework using concept-based linguistic methods and machine learning for twitter sentiment analysis.https://doi.org/10.1016/j.patrec.2022.04.004Maryum Bibi, Wajid Arshad Abbasi, Wajid Aziz, Sundus Khalil, Mueen Uddin, Celestine Iwendi, Thippa Reddy Gadekallu: A novel unsupervised ensemble framework using concept-based linguistic methods and machine learning for twitter sentiment analysis.Pattern Recognit. Lett.158: 80-86 (2022)]]>https://dblp.org/rec/journals/prl/BibiAAKUIG22Sat, 01 Jan 2022 00:00:00 +0100Secure Smart Wearable Computing through Artificial Intelligence-Enabled Internet of Things and Cyber-Physical Systems for Health Monitoring.https://doi.org/10.3390/s22031076Lakshmana Kumar Ramasamy, Firoz Khan, Mohammad Shah, Balusupati Veera Venkata Siva Prasad, Celestine Iwendi, Cresantus Biamba: Secure Smart Wearable Computing through Artificial Intelligence-Enabled Internet of Things and Cyber-Physical Systems for Health Monitoring.Sensors22(3): 1076 (2022)]]>https://dblp.org/rec/journals/sensors/RamasamyKSPIB22Sat, 01 Jan 2022 00:00:00 +0100Game Theory-Based Authentication Framework to Secure Internet of Vehicles with Blockchain.https://doi.org/10.3390/s22145119Manik Gupta, Rakesh Kumar, Shashi Shekhar, Bhisham Sharma, Ram Bahadur Patel, Shaily Jain, Imed Ben Dhaou, Celestine Iwendi: Game Theory-Based Authentication Framework to Secure Internet of Vehicles with Blockchain.Sensors22(14): 5119 (2022)]]>https://dblp.org/rec/journals/sensors/GuptaKSSPJDI22Sat, 01 Jan 2022 00:00:00 +0100An Efficient and Privacy-Preserving Scheme for Disease Prediction in Modern Healthcare Systems.https://doi.org/10.3390/s22155574Shynu Padinjappurathu Gopalan, Chiranji Lal Chowdhary, Celestine Iwendi, Muhammad Awais Farid, Lakshmana Kumar Ramasamy: An Efficient and Privacy-Preserving Scheme for Disease Prediction in Modern Healthcare Systems.Sensors22(15): 5574 (2022)]]>https://dblp.org/rec/journals/sensors/Padinjappurathu22Sat, 01 Jan 2022 00:00:00 +0100A Counter-Eavesdropping Technique for Optimized Privacy of Wireless Industrial IoT Communications.https://doi.org/10.1109/TII.2021.3140109Joseph Henry Anajemba, Celestine Iwendi, Imran Razzak, James Adu Ansere, Izuchukwu Michael Okpalaoguchi: A Counter-Eavesdropping Technique for Optimized Privacy of Wireless Industrial IoT Communications.IEEE Trans. Ind. Informatics18(9): 6445-6454 (2022)]]>https://dblp.org/rec/journals/tii/AnajembaIRAO22Sat, 01 Jan 2022 00:00:00 +0100Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing.https://doi.org/10.1109/ACCESS.2021.3049564Maryam Shabbir, Ayesha Shabbir, Celestine Iwendi, Abdul Rehman Javed, Muhammad Rizwan, Norbert Herencsar, Jerry Chun-Wei Lin: Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing.IEEE Access9: 8820-8834 (2021)]]>https://dblp.org/rec/journals/access/ShabbirSIJRHL21Fri, 01 Jan 2021 00:00:00 +0100Field-programmable gate arrays in a low power vision system.https://doi.org/10.1016/j.compeleceng.2021.106996Ponnan Suresh, Saravanakumar Umathurai, Celestine Iwendi, Senthilkumar Mohan, Gautam Srivastava: Field-programmable gate arrays in a low power vision system.Comput. Electr. Eng.90: 106996 (2021)]]>https://dblp.org/rec/journals/cee/SureshUIMS21Fri, 01 Jan 2021 00:00:00 +0100Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system.https://doi.org/10.1002/ett.3997Mohit Mittal, Celestine Iwendi, Suleman Khan, Abdul Rehman Javed: Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system.Trans. Emerg. Telecommun. Technol.32(6) (2021)]]>https://dblp.org/rec/journals/ett/MittalIKJ21Fri, 01 Jan 2021 00:00:00 +0100TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network.https://doi.org/10.1155/2021/5521713Mohammad Sirajuddin, Ch. Rupa, Celestine Iwendi, Cresantus Biamba: TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network.Secur. Commun. Networks2021: 5521713:1-5521713:9 (2021)]]>https://dblp.org/rec/journals/scn/SirajuddinRIB21Fri, 01 Jan 2021 00:00:00 +0100A metaheuristic optimization approach for energy efficiency in the IoT networks.https://doi.org/10.1002/spe.2797Celestine Iwendi, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu, Kuruva Lakshmanna, Ali Kashif Bashir, Md. Jalil Piran: A metaheuristic optimization approach for energy efficiency in the IoT networks.Softw. Pract. Exp.51(12): 2558-2571 (2021)]]>https://dblp.org/rec/journals/spe/IwendiMGLBP21Fri, 01 Jan 2021 00:00:00 +0100Optimal soft error mitigation in wireless communication using approximate logic circuits.https://doi.org/10.1016/j.suscom.2021.100521Joseph Henry Anajemba, James Adu Ansere, Frederick Sam, Celestine Iwendi, Gautam Srivastava: Optimal soft error mitigation in wireless communication using approximate logic circuits.Sustain. Comput. Informatics Syst.30: 100521 (2021)]]>https://dblp.org/rec/journals/suscom/AnajembaASIS21Fri, 01 Jan 2021 00:00:00 +0100Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures.https://doi.org/10.1145/3448614Celestine Iwendi, Saif Ur Rehman, Abdul Rehman Javed, Suleman Khan, Gautam Srivastava: Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures.ACM Trans. Internet Techn.21(3): 73:1-73:22 (2021)]]>https://dblp.org/rec/journals/toit/IwendiRJKS21Fri, 01 Jan 2021 00:00:00 +0100Realizing an Efficient IoMT-Assisted Patient Diet Recommendation System Through Machine Learning Model.https://doi.org/10.1109/ACCESS.2020.2968537Celestine Iwendi, Suleman Khan, Joseph Henry Anajemba, Ali Kashif Bashir, Fazal Noor: Realizing an Efficient IoMT-Assisted Patient Diet Recommendation System Through Machine Learning Model.IEEE Access8: 28462-28474 (2020)]]>https://dblp.org/rec/journals/access/IwendiKABN20Wed, 01 Jan 2020 00:00:00 +0100Optimal Cooperative Offloading Scheme for Energy Efficient Multi-Access Edge Computation.https://doi.org/10.1109/ACCESS.2020.2980196Joseph Henry Anajemba, Tang Yue, Celestine Iwendi, Mamdouh Alenezi, Mohit Mittal: Optimal Cooperative Offloading Scheme for Energy Efficient Multi-Access Edge Computation.IEEE Access8: 53931-53941 (2020)]]>https://dblp.org/rec/journals/access/AnajembaTIAM20Wed, 01 Jan 2020 00:00:00 +0100KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks.https://doi.org/10.1109/ACCESS.2020.2988160Celestine Iwendi, Zunera Jalil, Abdul Rehman Javed, G. Thippa Reddy, Rajesh Kaluri, Gautam Srivastava, Ohyun Jo: KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks.IEEE Access8: 72650-72660 (2020)]]>https://dblp.org/rec/journals/access/IwendiJJRKSJ20Wed, 01 Jan 2020 00:00:00 +0100Artificial Intelligence Enabled Road Vehicle-Train Collision Risk Assessment Framework for Unmanned Railway Level Crossings.https://doi.org/10.1109/ACCESS.2020.3002416Vivek Singhal, S. S. Jain, Divya Anand, Aman Singh, Sahil Verma, Kavita, Joel J. P. C. Rodrigues, Noor Zaman, Uttam Ghosh, Ohyun Jo, Celestine Iwendi: Artificial Intelligence Enabled Road Vehicle-Train Collision Risk Assessment Framework for Unmanned Railway Level Crossings.IEEE Access8: 113790-113806 (2020)]]>https://dblp.org/rec/journals/access/SinghalJASVKRZG20Wed, 01 Jan 2020 00:00:00 +0100N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets.https://doi.org/10.1016/j.comcom.2020.07.032Celestine Iwendi, Syed Atif Moqurrab, Adeel Anjum, Sangeen Khan, Senthilkumar Mohan, Gautam Srivastava: N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets.Comput. Commun.161: 160-171 (2020)]]>https://dblp.org/rec/journals/comcom/IwendiMAKMS20Wed, 01 Jan 2020 00:00:00 +0100A review on classification of imbalanced data for wireless sensor networks.https://doi.org/10.1177/1550147720916404Harshita Patel, Dharmendra Singh Rajput, G. Thippa Reddy, Celestine Iwendi, Ali Kashif Bashir, Ohyun Jo: A review on classification of imbalanced data for wireless sensor networks.Int. J. Distributed Sens. Networks16(4) (2020)]]>https://dblp.org/rec/journals/ijdsn/PatelRRIBJ20Wed, 01 Jan 2020 00:00:00 +0100Analyzing the Effectiveness and Contribution of Each Axis of Tri-Axial Accelerometer Sensor for Accurate Activity Recognition.https://doi.org/10.3390/s20082216Abdul Rehman Javed, Muhammad Usman Sarwar, Suleman Khan, Celestine Iwendi, Mohit Mittal, Neeraj Kumar: Analyzing the Effectiveness and Contribution of Each Axis of Tri-Axial Accelerometer Sensor for Accurate Activity Recognition.Sensors20(8): 2216 (2020)]]>https://dblp.org/rec/journals/sensors/JavedSKIMK20Wed, 01 Jan 2020 00:00:00 +0100The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems.https://doi.org/10.3390/s20092559Celestine Iwendi, Suleman Khan, Joseph Henry Anajemba, Mohit Mittal, Mamdouh Alenezi, Mamoun Alazab: The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems.Sensors20(9): 2559 (2020)]]>https://dblp.org/rec/journals/sensors/IwendiKAMAA20Wed, 01 Jan 2020 00:00:00 +0100Realizing Efficient Security and Privacy in IoT Networks.https://doi.org/10.3390/s20092609Joseph Henry Anajemba, Yue Tang, Celestine Iwendi, Akpesiri Ohwoekevwo, Gautam Srivastava, Ohyun Jo: Realizing Efficient Security and Privacy in IoT Networks.Sensors20(9): 2609 (2020)]]>https://dblp.org/rec/journals/sensors/AnajembaTIOSJ20Wed, 01 Jan 2020 00:00:00 +0100Robust Navigational Control of a Two-Wheeled Self-Balancing Robot in a Sensed Environment.https://doi.org/10.1109/ACCESS.2019.2923916Celestine Iwendi, Mohammed A. Alqarni, Joseph Henry Anajemba, Ahmed S. Alfakeeh, Zhiyong Zhang, Ali Kashif Bashir: Robust Navigational Control of a Two-Wheeled Self-Balancing Robot in a Sensed Environment.IEEE Access7: 82337-82348 (2019)]]>https://dblp.org/rec/journals/access/IwendiAAAZB19Tue, 01 Jan 2019 00:00:00 +0100Socio-Technological Factors Affecting User's Adoption of eHealth Functionalities: A Case Study of China and Ukraine eHealth Systems.https://doi.org/10.1109/ACCESS.2019.2924584Svitlana Kutia, Sajjad Hussain Chauhdary, Celestine Iwendi, Lin Liu, Wang Yong, Ali Kashif Bashir: Socio-Technological Factors Affecting User's Adoption of eHealth Functionalities: A Case Study of China and Ukraine eHealth Systems.IEEE Access7: 90777-90788 (2019)]]>https://dblp.org/rec/journals/access/KutiaCILYB19Tue, 01 Jan 2019 00:00:00 +0100A Survey on Energy-Aware Wireless Sensor Routing Protocols.https://doi.org/10.4108/eai.11-6-2019.160835Mohit Mittal, Celestine Iwendi: A Survey on Energy-Aware Wireless Sensor Routing Protocols.EAI Endorsed Trans. Energy Web6(24): e5 (2019)]]>https://dblp.org/rec/journals/ew/MittalI19Tue, 01 Jan 2019 00:00:00 +0100Sensors Driven AI-Based Agriculture Recommendation Model for Assessing Land Suitability.https://doi.org/10.3390/s19173667P. M. Durai Raj Vincent, Natarajan Deepa, Dhivya Elavarasan, Kathiravan Srinivasan, Sajjad Hussain Chauhdary, Celestine Iwendi: Sensors Driven AI-Based Agriculture Recommendation Model for Assessing Land Suitability.Sensors19(17): 3667 (2019)]]>https://dblp.org/rec/journals/sensors/VincentDESCI19Tue, 01 Jan 2019 00:00:00 +0100On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique.https://doi.org/10.1109/ACCESS.2018.2864111Celestine Iwendi, Mueen Uddin, James Adu Ansere, Pascal Nkurunziza, Joseph Henry Anajemba, Ali Kashif Bashir: On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique.IEEE Access6: 47258-47267 (2018)]]>https://dblp.org/rec/journals/access/IwendiUANAB18Mon, 01 Jan 2018 00:00:00 +0100ACO based key management routing mechanism for WSN security and data collection.https://doi.org/10.1109/ICIT.2018.8352482Celestine Iwendi, Zhiyong Zhang, Xin Du: ACO based key management routing mechanism for WSN security and data collection.ICIT2018: 1935-1939]]>https://dblp.org/rec/conf/icit2/IwendiZD18Mon, 01 Jan 2018 00:00:00 +0100Analysis of frequency characteristic of surface permanent magnet synchronous machine.https://doi.org/10.1109/ICIT.2018.8352511Shoushou Zhang, Celestine Iwendi, Siyuan Guo: Analysis of frequency characteristic of surface permanent magnet synchronous machine.ICIT2018: 2087-2092]]>https://dblp.org/rec/conf/icit2/ZhangIG18Mon, 01 Jan 2018 00:00:00 +0100An ACO-KMT Energy Efficient Routing Scheme for Sensed-IoT Network.https://doi.org/10.1109/IECON.2018.8591489Celestine Iwendi, James Adu Ansere, Pascal Nkurunziza, Joseph Henry Anajemba, Zhou Yixuan: An ACO-KMT Energy Efficient Routing Scheme for Sensed-IoT Network.IECON2018: 3841-3846]]>https://dblp.org/rec/conf/iecon/IwendiANAY18Mon, 01 Jan 2018 00:00:00 +0100Performance Analysis of D2D Energy Efficient IoT Networks with Relay-Assisted Underlaying Technique.https://doi.org/10.1109/IECON.2018.8591373Joseph Henry Anajemba, Yue Tang, James Adu Ansere, Celestine Iwendi: Performance Analysis of D2D Energy Efficient IoT Networks with Relay-Assisted Underlaying Technique.IECON2018: 3864-3869]]>https://dblp.org/rec/conf/iecon/AnajembaTAI18Mon, 01 Jan 2018 00:00:00 +0100Power consumption trade-off analysis in an OFDM communication chain.https://doi.org/10.1109/AFRCON.2011.6071957Celestine Iwendi: Power consumption trade-off analysis in an OFDM communication chain.AFRICON2011: 1-6]]>https://dblp.org/rec/conf/africon/Iwendi11Sat, 01 Jan 2011 00:00:00 +0100