Teaching Documents by Godspower Akawuku

Access Publications, 2024
The Internet of Things (IoT) has revolutionized various domains, offering connectivity and data s... more The Internet of Things (IoT) has revolutionized various domains, offering connectivity and data sharing among diverse devices and services. However, this interconnectedness poses significant security challenges, primarily centered around confidentiality, integrity, and availability. This paper investigates the security issues embedded in the layers of IoT architecture, ranging from the perception layer to the application layer. By leveraging the Defense-in-Depth security mechanism, we propose a comprehensive approach to fortify IoT systems against cyber threats. The Defense-in-Depth strategy is illustrated through a layered model, addressing security concerns at the perimeter, host, OS/application, and data layers. The study explores various security measures applicable to each layer, emphasizing the need for a multi-faceted approach to ensure the robustness of IoT security.
The teaching and research in the area of Computer networking and Data security have become basis ... more The teaching and research in the area of Computer networking and Data security have become basis for any aspiring computer scientist or software engineer. The implementations of most systems from Information Systems to Artificial Intelligent Systems are driven on Computer Networks and Data Security backbones. The paradigm extension of the network service providers to 5G is not excluded. This piece is aim to address basic topics in Computer Networks and Data Security education. The diagrams and explanations improve the readers understanding for further study, research and possibly implementation attempt(s).
Papers by Godspower Akawuku
International Journal of Research Publications
The term “Fan” was first time coined by Haast in his work about Canterbury Plains on 1864. He con... more The term “Fan” was first time coined by Haast in his work about Canterbury Plains on 1864. He consider that these plains were fan shaped developed by the depositional work from the Pleistocene Glaciers. After a century (1964) Carryer put out the concept that the Alluvial fans are formed in the foothill zone produced by the depositional work by river or water. “Alluvial fans and Cones due accumulation of materials are always famed at the base of foothills where there is abrupt drop (decrease) in the channel gradient.” (Savindar Singh). “An alluvial fan is a body of sediment whose surface form approximates to the segments of a cone which radiates down slope from a point on a mountain front, usally where a stream emerges.” (Michael A Summerfie

International Journal of Research Publication and Reviews, 2025
The rapidly evolving threat landscape continues to challenge the resilience of digital infrastruc... more The rapidly evolving threat landscape continues to challenge the resilience of digital infrastructure, particularly as zero-day exploits and delayed patch deployments expose organizations to long-term risks. In 2025, Microsoft's Patch Tuesday renowned for releasing security updates disclosed over 100 vulnerabilities, including several critical zero-day threats affecting core enterprise services. This event underscored the critical importance of proactive and strategic vulnerability management, especially in an era where reactive defenses are no longer sufficient. This paper critically analyzes the 2025 Patch Tuesday disclosures to extract practical insights for enhancing organizational cybersecurity postures. The study proposes a proactive cybersecurity framework grounded in the real-time analysis of Microsoft's patch release data, integrating multi-layered detection systems, automated patch deployment, and robust cross-functional collaboration. The objective is to minimize the window of exposure to emerging threats and foster long-term resilience against exploit attempts. By examining vulnerability types, exploitability indices, and patch timelines, this research identifies recurring organizational lapses that enable persistent threats to thrive. A mixed-method approach combining case analysis, threat intelligence review, and expert interviews provides a holistic understanding of vulnerability lifecycle challenges. The proposed framework introduces predictive analytics for vulnerability detection, streamlines cross-team communication channels, and encourages proactive patch prioritization based on risk scoring. Drawing from lessons learned during Microsoft's 2025 disclosures, the framework emphasizes timely decision-making and adaptive risk governance. The study contributes to the existing body of knowledge by highlighting the transition from reactive to anticipatory cybersecurity practices, urging both public and private institutions to rethink patching policies and threat response mechanisms. Finally, this paper calls for further research on the integration of artificial intelligence in patch management and suggests a roadmap for continuous vulnerability intelligence.

International Digital Organization for Scientific Research, 2025
Algorithms for encoding and decoding information play a critical role in the optimization of mode... more Algorithms for encoding and decoding information play a critical role in the optimization of modern systems, enabling efficient data representation, transmission, storage, and retrieval. This paper explores a landscape of encoding and decoding algorithms in payment systems with a focus on enhancing system performance across diverse domains, including communication networks, distributed computing, and machine learning. We analyze lossless and lossy encoding techniques, discussing their trade-offs in terms of compression ratio, computational complexity, and resilience to errors. Special attention is given to entropy-based methods such as Huffman and arithmetic coding, as well as modern techniques like neural compression and error-correcting codes including LDPC and Reed-Solomon codes. Furthermore, we investigated adaptive and context-aware encoding schemes that dynamically adjust to data patterns and system requirements, contributing to real-time optimization. By integrating these algorithms within larger system architectures, substantial gains in throughput, latency, and energy efficiency are demonstrated. The paper concludes with a discussion on current challenges, including scalability and security, and proposes future research directions that leverage advances in artificial intelligence and quantum computing to further enhance encoding and decoding strategies for next-generation system optimization.

International Digital Organization for Scientific Research, 2025
This paper presents a Systematic Literature Review (SLR) that explores the intersection of Quick ... more This paper presents a Systematic Literature Review (SLR) that explores the intersection of Quick Response (QR) codes, cryptographic models, and card payment systems. With the rapid evolution of digital payment infrastructures, QR-based transactions have become increasingly prevalent due to their ease of use, low cost, and accessibility. However, the integration of QR codes into card payment systems introduces significant security and privacy concerns, necessitating robust cryptographic solutions. This review systematically analyzes existing research from 2015 to 2025, focusing on the technological frameworks, security protocols, and vulnerabilities associated with QR code transactions and card-based payments. Key themes identified include symmetric and asymmetric encryption models, public key infrastructures (PKIs), tokenization, and blockchain-based enhancements. The review also evaluates the performance, scalability, and usability of various cryptographic schemes in the context of real-time payment authentication and fraud prevention. Through a comprehensive analysis of over 25 peer-reviewed publications, this study highlights research gaps, particularly in lightweight cryptographic models suitable for mobile and low-resource environments. The paper concludes by proposing a conceptual framework for a secure and efficient payment architecture that integrates QR codes with advanced cryptographic techniques, aiming to inform future research and development in secure digital payment ecosystems.

International Digital Organisation for Scientific Research , 2025
Algorithms for encoding and decoding information play a critical role in the optimization of mode... more Algorithms for encoding and decoding information play a critical role in the optimization of modern systems, enabling efficient data representation, transmission, storage, and retrieval. This paper explores a landscape of encoding and decoding algorithms in payment systems with a focus on enhancing system performance across diverse domains, including communication networks, distributed computing, and machine learning. We analyze lossless and lossy encoding techniques, discussing their trade-offs in terms of compression ratio, computational complexity, and resilience to errors. Special attention is given to entropy-based methods such as Huffman and arithmetic coding, as well as modern techniques like neural compression and error-correcting codes including LDPC and Reed-Solomon codes. Furthermore, we investigated adaptive and context-aware encoding schemes that dynamically adjust to data patterns and system requirements, contributing to real-time optimization. By integrating these algorithms within larger system architectures, substantial gains in throughput, latency, and energy efficiency are demonstrated. The paper concludes with a discussion on current challenges, including scalability and security, and proposes future research directions that leverage advances in artificial intelligence and quantum computing to further enhance encoding and decoding strategies for next-generation system optimization.

NIJSES PUBLICATIONS , 2025
Microservices Architecture (MSA) has become a popular approach for developing scalable and adapta... more Microservices Architecture (MSA) has become a popular approach for developing scalable and adaptable cloud applications, offering enhanced flexibility, maintainability, and resilience compared to traditional monolithic systems. However, the practical application of MSA introduces operational complexities, particularly in optimizing performance, ensuring fault tolerance, and managing inter-service communication. Empirical research is essential to address these challenges and validate MSA's performance. This involves employing methodologies such as case studies, performance testing, and profiling to provide actionable insights into key areas like scalability, latency, and system resilience. By evaluating system behavior under varying conditions, researchers can bridge the gap between the theoretical advantages of MSA and its real-world application in cloud environments. This research emphasizes the importance of empirical frameworks in guiding the implementation and evaluation of MSA. These frameworks offer structured methods for assessing performance, scalability, and reliability, thereby enabling organizations to make informed decisions about adopting and optimizing MSA. The findings contribute to a deeper understanding of the trade-offs and best practices associated with MSA, supporting its effective deployment in complex cloud-based systems.

Development of a Diabetes Mellitus Diagnostic System Using Self-Organizing Map Algorithm: A Machine Learning Approach
IDOSR Journal of Scientific Research, Mar 11, 2024
Delivery of Health care services in developing nations has posed a huge problem to the world at l... more Delivery of Health care services in developing nations has posed a huge problem to the world at large. The United Nations and the World Health Organization have been on the front burner sorting for ways of improving these problems to abate the yearly mortality rates which are caused largely by inadequate health facilities, poor technical know-how, and poor health care administration. One disease that has a high number of patients is diabetes. In Nigeria, out of a population of 200 million, diabetes kills over 2% yearly. To reduce this menace, early diagnosis and awareness are important. And automation of the medical diagnostic system is one of the sure ways of achieving these feet. This paper explores the potential of a self-organizing map algorithm; a machine learning technique in the development of a diabetes mellitus diagnostic system (DMDS). Data collected from 120 patients from the University of Port Harcourt Teaching Hospital (UPTH) was used in the training and validation of the model. The confusion matrix formula was used in testing the sensitivity and accuracy of the model which yielded 75.63% and 87.2% respectively which are within the accepted range, predefined by expert physicians.

IDOSR Journal of Scientific Research, Mar 11, 2024
In the digital era, message boards serve as vital hubs for diverse discussions, knowledge dissemi... more In the digital era, message boards serve as vital hubs for diverse discussions, knowledge dissemination, and community interaction. However, navigating the vast and varied content on these platforms presents a formidable challenge. This research pioneers the utilization of stack ensemble techniques to revolutionize topic modeling on message board data. Integrating Latent Dirichlet Allocation (LDA), Non-negative Matrix Factorization (NMF), and Latent Semantic Analysis (LSA) within a sophisticated ensemble framework, this study introduces a paradigm shift in extracting nuanced insights. Incorporating domain-specific features, sentiment analysis, and temporal patterns enriches contextual understanding. Rigorous evaluation across diverse message board datasets underscores the ensemble method's unparalleled accuracy, stability, and interpretability, setting a new standard for discourse analysis in online communities.

IDOSR PUBLICATIONS, 2024
Delivery of Health care services in developing nations has posed a huge problem to the world at l... more Delivery of Health care services in developing nations has posed a huge problem to the world at large. The United Nations and the World Health Organization have been on the front burner sorting for ways of improving these problems to abate the yearly mortality rates which are caused largely by inadequate health facilities, poor technical know-how, and poor health care administration. One disease that has a high number of patients is diabetes. In Nigeria, out of a population of 200 million, diabetes kills over 2% yearly. To reduce this menace, early diagnosis and awareness are important. And automation of the medical diagnostic system is one of the sure ways of achieving these feet. This paper explores the potential of a self-organizing map algorithm; a machine learning technique in the development of a diabetes mellitus diagnostic system (DMDS). Data collected from 120 patients from the University of Port Harcourt Teaching Hospital (UPTH) was used in the training and validation of the model. The confusion matrix formula was used in testing the sensitivity and accuracy of the model which yielded 75.63% and 87.2% respectively which are within the accepted range, predefined by expert physicians.

Detecting and Preventing of DDoS Attack in Cloud Computing Environment Based on Hybrid Technique (Cloudflare and WAF)
NEWPORT INTERNATIONAL JOURNAL OF ENGINEERING AND PHYSICAL SCIENCES
The adoption of cloud computing has revolutionized data storage and processing globally. Neverthe... more The adoption of cloud computing has revolutionized data storage and processing globally. Nevertheless, the need for a close watch on security is paramount. Hence, the aim of this paper, to develop a cloud security model that detects and prevents the risks of Distributed Denial of Service (DDoS) attacks in cloud computing systems which are gravely potent and, on the increase, today. This was done using two approaches: analyzing Transmission Control Protocol/Internet Protocol (TCP/IP) header features of incoming packets in cloud computing environment in order to detect and classify spoofed IP address during DDoS attack via a custom-made Web Application Firewall (WAF); and the integration of the cloud resources with Cloudflare. The result shows that a total of 1,625,192 packets were transmitted in a short period which were captured and analyzed via Wireshark. Several TCP errors were observed over a very short time interval which indicated successful DDoS attack effectively crashing the...
Understanding and Mitigating Cloud Computing Security Attacks: A Case of DDoS
NEWPORT INTERNATIONAL JOURNAL OF SCIENTIFIC AND EXPERIMENTAL SCIENCES
Although cloud computing is considered the most widespread technology. Despite of what it offers,... more Although cloud computing is considered the most widespread technology. Despite of what it offers, the end users still suffers many challenges, especially related to its security issues such as vulnerability to malicious attacks such as Distributed Denial of Service attack (DDoS), that prevents accessing the internet. This paper is design to bring understanding and ways of mitigating DDoS attacks in cloud computing environment by leveraging from the pool of diverse solutions proffered that detect and prevent such attacks from harming network communication. Keywords: Cloudflare, Firewall, Gateway, Webserver and Zombies

Recently, Enterprises that operate over vast geographical areas uses multiple data centers to col... more Recently, Enterprises that operate over vast geographical areas uses multiple data centers to collect, store and process data in real time via energy-efficient acquisition, wirelessly transport clients or users data to the cloud. This paper seeks to technically review existing Data Center Networks (DCN) considering BDSMC applications. In this research, related works on Distributed Data Center Networks will be presented. Within the stream computing ecosystems, there are various network models but the pool of possible DCN topologies/architectures to adopt appears little and unfit for the purpose of BDSMC optimization. However, most related Data center architecture will be reviewed. Investigate efforts on both server centric and switch-centric models adaptable to BDSMC network layer. The extent of work done on distributed spine-leaf redesigned server-centric network construction so as to automatically harvest network interconnection into a 'stellar' dual-port server-centric SG network; how classical graph-based interconnection network translate network performance similar to generic works for BDSMC ecosystems. Review stellar transformation using the well-studied generalized hypercube family of interconnection networks for BDSMC ecosystems. The literature was searched from the databases:

In the world of data currency for computational transaction from end user to the edge, then to th... more In the world of data currency for computational transaction from end user to the edge, then to the cloud, this sequence of digitally encoded coherent signals (homogenous and heterogenous data packets) used to transmit or receive information becomes necessary to understudy. The paper seeks to tabularly survey the implication of data stream workload in various applications vis-à-vis Technology Driver, Defects/Limitations and Support for Big Data Stream mobile Computing (BDSMC). Three major databases, Scopus, ScienceDirect and EBSCO, which indexes journals and conferences that are promoted by entities such as IEEE, ACM, SpringerLink, and Elsevier were explored as data sources. Out of the initial 119 papers that resulted from the first search string, 40 papers were found to be relevant to the research concern after implementing the inclusion and exclusion criteria. In conclusion, it was recommended that research efforts should be geared towards developing scalable frameworks and algorithms that will accommodate data stream offloading, effective resource management strategy and workload issues to accommodate the ever-growing size and complexity of data.

With the exponential development and speedy growth of information economy, information security u... more With the exponential development and speedy growth of information economy, information security urgency is expedient. This paper presents a security model cryptograph algorithm which would enable authentication and authorization of access from different platforms in Information systems, providing a Biometric authenticating and authorization system that would identify any access from diverse platform of the organization. The experimental testbed is Nnamdi Azikiwe University Student portal with different application modules running in different server; each server/application provides its own authentication and authorization request to the systems resources by users. The Object-oriented Hypermedia Design MethodJava 2 Enterprise Edition (OOHDMJ2EE) is the methodology adopted for this research. Consequently, result showed that within this framework, users enjoy seamless, secure access to partners’ services via a single sign-on (SSO) to multiple applications.

International Digital Organization for Scientific Research ISSN: 2579-079X, 2021
With the exponential development and speedy growth of information economy, information security u... more With the exponential development and speedy growth of information economy, information security urgency is expedient. This paper presents a security model cryptograph algorithm which would enable authentication and authorization of access from different platforms in Information systems, providing a Biometric authenticating and authorization system that would identify any access from diverse platform of the organization. The experimental testbed is Nnamdi Azikiwe University Student portal with different application modules running in different server; each server/application provides its own authentication and authorization request to the systems resources by users. The Object-oriented Hypermedia Design Method-Java 2 Enterprise Edition (OOHDM-J2EE) is the methodology adopted for this research. Consequently, result showed that within this framework, users enjoy seamless, secure access to partners' services via a single sign-on (SSO) to multiple applications.

EURASIAN EXPERIMENT JOURNAL OF ENGINEERING (EEJE), 2023
Waste Management in Anambra State Capital City (AWKA) has become a serious concern both to indivi... more Waste Management in Anambra State Capital City (AWKA) has become a serious concern both to individuals and government. Smart-Trash also known as Waste Management System (WMS) is a comprehensive system designed to efficiently and effectively manage waste in the city. The system includes various components such as waste collection, transportation and disposal. In Awka, waste collection is carried out by designated waste management agencies or contractors. These agencies are responsible for collecting waste from households, commercial establishments, and public areas. They use specialized vehicles and equipment to ensure proper collection and containment of waste. Once the waste is collected, it is transported to designated landfill sites for outright disposal. Prototyping Methodology was adopted. In this paradigm, an Online Waste Management System (OWMS) called Smart-Trash software (application/app) is modeled to coordinate the process of proper solid waste disposal swiftly. The software connects the waste generators and the waste collectors, then eventual management of the waste. Anambra state (Awka in particular) will have treatment facilities, including composting plants, recycling centers, and waste-to-energy plants. These facilities employ advanced technologies to process waste and minimize its environmental impact. After treatment, the waste is either recycled or disposed of in a safe and environmentally friendly manner. The Recycling efforts will focus on materials such as paper, plastic, glass, and metal. These materials are sorted, processed, and sent to recycling industries for further use. For waste that cannot be recycled, proper disposal methods are employed. Nonrecyclable waste is safely disposed of at designated landfill sites. These landfill sites are carefully managed to prevent environmental contamination and ensure long-term sustainability. Overall, the Waste Management System in Awka aims to promote a clean and healthy environment by efficiently managing waste and minimizing its impact on the city and its residents.

International Network Organization for Scientific Research , 2022
Integrated 3-D seismic and well-log interpretation was employed to re-evaluate the hydrocarbon pr... more Integrated 3-D seismic and well-log interpretation was employed to re-evaluate the hydrocarbon prospects of NKO Field in Onshore Northern Depobelt of Niger Delta Basin, Nigeria. The objectives of this research are to map and interpret the structural framework of the field, identify the reservoirs present and access their continuity across the studied area and obtain petrophysical parameters of the reservoirs. Four reservoirs (A1, A2, A3, and A4) were identified, correlated and mapped using available well-log suites. The sand units were further mapped on seismic section with the aid of synthetic seismogram. Seven faults were mapped to constitute the structural framework of the field. Time and depth structural maps of the interpreted reservoirs shows the distribution of the fault networks with the major faults trending northwest-southeast. Petrophysical analysis for reservoirs A1 and A3 showed good reservoir potential and quality with average porosity of 0.27 & 0.21; Net-to-Gross of 0.765 & 0.79; and hydrocarbon saturation of 0.55 & 0.31 respectively. Two prospects were identified from depth structural maps of A1 and A3 reservoirs at the central fault block sandwiched between two major faults which are responsible for possible hydrocarbon accumulation. The trapping mechanisms are 2-way and 3-way fault dependent closures.. The results of this research show that NKO Field has potentials for further development drilling.
NIJSES Publication, 2023
In recent times, Organizations are moving toward broader workflow automation across business oper... more In recent times, Organizations are moving toward broader workflow automation across business operations and IT processes, particularly in this era of cloud services. This helps to speed up processes and improve communication. Workflow automation optimizes processes by replacing manual tasks with software that executes all or part of a process. Today, this is usually done through workflow automation software that consists of low-code, drag-and-drop features and adoption-friendly User interfaces. Nevertheless, the fundamental workflow models and principles are not undermined to achieve organizational objectives, specifically for business startups hence the focus of this paper.
Uploads
Teaching Documents by Godspower Akawuku
Papers by Godspower Akawuku