Publication Title Fraud Detection System for Effective Healthcare Administration in Nigeria using Apache Hive and Big Data Analytics: Reflection on the National Health Insurance Scheme
Publication Type conference
Publisher IEEE
Publication Authors Justin Onyarin Ogala; Ese Sophia Mughele; Stella Chinnye Chiemeke
Year Published 2022-03-11
Abstract Nigerian researchers have shown that the lack of adequate mechanisms for fraud detection has impaired both providers and beneficiaries of this scheme. This work develops a fraud detection program for Nigeria's National Health Insurance Scheme (NHIS). Nigeria's National Health Insurance Scheme (NHIS) and Health Maintenance Organizations (HMOs) are the subjects of this study. The study was conducted using available data from NHIS-registered healthcare facilities and HMOs. Unified Modeling Language (UML) tools were used to create the framework. The framework was built with Apache Derby DB, Hadoop Distributed File System (HDFS), and Apache MapReduce as the big data processing platform. Using Apache Hive and big data analytics, a system for detecting healthcare fraud is developed. This system used data from the Nigerian National Health Insurance Scheme (NHIS), which was broken down into three categories: enrollment, referral, and claim data. An analysis of current healthcare investigative methods is conducted, and a new framework is proposed.
Publication Type journal
Publisher International Journal of Advances in Engineering and Management (IJAEM)Volume 4, Issue 4 Apr 2022, pp: 17-25 www.ijaem.net ISSN: 2395-5252
Publication Authors Justin Onyarin Ogala; Aghware, Obukohwo Fidelis
Year Published 2022-04-07
Abstract Malware is a malicious code, program, or piece of software. It refers to a program that is introduced into a system, often invisibly (covertly), to jeopardize the secrecy, integrity, or accessibility of the victim's information, data, applications, software, or operating system (OS), as well as obstruct the victim's system's proper function and obstructing a good user experience. They are frequently constructed to carry out numerous delicious and criminal activities in such a way that their very existence at least when first introduced into the victim's system, is an act of utter neglect. Before 2000, malware infestations and prevention concentrated on system attacks, denial of service, and other methods. Individuals, corporations, and governments have been involved in malicious code design and spread for distributed network collapse and cyberwars since the year 2000. Individuals and businesses have suffered massive losses due to widespread ignorance regarding the nature of malware generation and spreading. With new Malware appearing daily to add to the hundreds already in existence, it is clear that the virus problem is not going away anytime soon. This document covers the history of Malware and its various classifications and obfuscation tactics, detection, and prevention tips for all computer users
Publication Type journal
Publisher GSJ: Volume 8, Issue 5, May 2020, Online: ISSN 2320-9186 www.globalscientificjournal.com
Publication Authors Justin Onyarin Ogala; Deborah Voke Ojie
Year Published 2020-05-04
Abstract With the emergence of software industry in recent times, more people are interested in learning programming languages. But nowadays there are more than 250 programming
languages available, only a few of them can be applied comparatively widely. In this paper, the
research in programming language was conducted. Four of the most popular programming
languages C, C++, C# and Java are chosen to be the objects to study. The technical features of
these four programming languages were summarized and compared with each other. To know
the actual performance of these four chosen programming languages, an experiment was
carried out by implementing the benchmark for each programming language. The result from
the experiment was recorded and analyzed. The research concluded the most suitable application
fields for these four of the most popular programming languages according to the technical features and the result from the experiment. C is suitable for systems-programming
applications, hardware related applications, embedded device, chip designing, and industrial
automation products. C++ is appropriate for the software development such as application
software, device drivers and high-performance server. C# is proper for application development
and the development of web application. Java has three different forms, Java2 Standard Edition
(J2SE), Java2 Micro Edition (J2ME), and Java2 Enterprise Edition (J2EE). J2SE is suitable for
the desktop applications. J2ME is proper for embedded systems development for mobile
phones, wireless application and PDA programming. Finally, J2EE is appropriate for the development of server programming
Publication Type journal
Publisher International Journal of Computer Science and Information Security (IJCSIS), Vol. 20, No. 2, February 2022
Paper Link https://doi.org/10.5281/zenodo.6376787
Publication Authors Justin Onyarin Ogala
Year Published 2022-02-07
Abstract DevOps is a systematic methodology, tools, and
philosophical framework for automating and integrating
software development and IT operations teams. Team
empowerment, cross-team communication and cooperation,
and technological automation are all emphasized. DevOps
refers to a collection of integrated activities or procedures used
to automate and interconnect software development processes
with IT developers with the goal of swiftly and reliably
producing, testing, and delivering deliverables. DevOps has resulted in developers or practitioners using endless loops to
highlight the link between development lifecycle phases regularly. Even though the numerous activities or processes in
a DevOps build a loop and flow sequentially, iteration requires that the flow be collaborative and repeated at all times in order to improve the entire lifecycle. Various software automation
trends might be equipped to manage the industry's current software and technology if DevOps investigates them thoroughly.
Publication Title A REVIEW OF WIRELESS SENSOR NETWORK TECHNOLOGIES IN THE CONTEXT OF THE INTERNET OF THINGS (IoT)
Publication Type conferenceproceeding
Publisher CoNIMS Conference Proceedings, CASMDPR (Computer Application, Security Management and Data ProtectionRegulations) 2021
Publication Authors Justin Ogala; Mughele Ese
Year Published 2021-10-05
Abstract This review paper provides an in-depth analysis of Wireless Sensor Network (WSN) technologies in the context of the Internet of Things (IoT). With the widespread use of IoT, the demand for WSNs has increased tremendously, making it necessary to explore the technologies that enable the integration of WSNs and IoT. This paper discusses the fundamental concepts of WSNs and IoT, explores the challenges faced by WSNs in the context of IoT, and provides insights into the various applications of WSNs in IoT. The review also examines the data collection and aggregation technique used in WSNs and highlights the limitations of current WSN technologies. Finally, the paper concludes with recommendations for future research to address the challenges facing WSNs in the context of IoT and to improve the efficiency and effectiveness of WSN technologies.