


default search action
ICTA 2020: Minna, Nigeria
- Sanjay Misra

, Bilkisu Larai Muhammad-Bello
:
Information and Communication Technology and Applications - Third International Conference, ICTA 2020, Minna, Nigeria, November 24-27, 2020, Revised Selected Papers. Communications in Computer and Information Science 1350, Springer 2021, ISBN 978-3-030-69142-4
Artificial Intelligence, Big Data and Machine Learning
- Rytis Maskeliunas

, Andrius Lauraitis, Robertas Damasevicius, Sanjay Misra:
Multi-class Model MOV-OVR for Automatic Evaluation of Tremor Disorders in Huntington's Disease. 3-14 - Aliyu Mustapha

, Abdullahi Kutiriko Abubakar, Haruna Dokoro Ahmed, Abdulkadir Mohammed:
Application of Big Data Analytics for Improving Learning Process in Technical Vocational Education and Training. 15-25 - Ananya Misra:

A Survey for Recommender System for Groups. 26-40 - Joseph Bamidele Awotunde

, Rasheed Gbenga Jimoh
, Idowu Dauda Oladipo
, Muyideen Abdulraheem
:
Prediction of Malaria Fever Using Long-Short-Term Memory and Big Data. 41-53 - Ochilbek Rakhmanov

, Senol Dane:
Improving the Prediction Accuracy of Academic Performance of the Freshman Using Wonderlic Personnel Test and Rey-Osterrieth Complex Figure. 54-65 - Jacob O. Mebawondu

:
Comparative Analyses of Machine Learning Paradigms for Operators' Voice Call Quality of Service. 66-79 - Salefu Ngbede Odaudu

, Ime J. Umoh, Emmanuel Adewale Adedokun
, Chukwuma Jonathan:
LearnFuse: An Efficient Distributed Big Data Fusion Architecture Using Ensemble Learning Technique. 80-92 - Isabona Joseph

, Ojuh O. Divine:
A Gaussian Mixture Model with Firm Expectation-Maximization Algorithm for Effective Signal Power Coverage Estimation. 93-106 - Sujata Panda, Hima Bindu Maringanti:

Analysis and Classification of Biomedical Data Using Machine Learning Techniques. 107-118 - Akshat Agrawal

, Anurag Jain:
Emotion Recognition of Speech in Hindi Using Dimensionality Reduction and Machine Learning Techniques. 119-129 - Ojuh O. Divine, Isabona Joseph

:
Application of Supervised Machine Learning Based on Gaussian Process Regression for Extrapolative Cell Availability Evaluation in Cellular Communication Systems. 130-144 - Benjamin Aruwa Gyunka, Oluwakemi Christiana Abikoye, Adekeye S. Adekunle:

Anomaly Android Malware Detection: A Comparative Analysis of Six Classifiers. 145-157 - Kayode Omotosho Alabi, Sulaiman Olaniyi Abdulsalam

, Roseline Oluwaseun Ogundokun
, Micheal Olaolu Arowolo:
Credit Risk Prediction in Commercial Bank Using Chi-Square with SVM-RBF. 158-169 - Adam Adenike Azeezat, Onashoga Sadiat Adebukola, Adebayo Abayomi-Alli

, Omoyiola Bayo Olushola:
A Conceptual Hybrid Model of Deep Convolutional Neural Network (DCNN) and Long Short-Term Memory (LSTM) for Masquerade Attack Detection. 170-184 - Ochilbek Rakhmanov

:
An Automated Framework for Swift Lecture Evaluation Using Speech Recognition and NLP. 185-195 - Emmanuel Adetiba

, Amarachi E. Opara, Oluwaseun T. Ajayi
, Folashade O. Owolabi:
DeepFacematch: A Convolutional Neural Network Model for Contactless Attendance on e-SIWES Portal. 196-205 - Usman Haruna

, Umar Sunusi Maitalata, Murtala Mohammed, Jaafar Zubairu Maitama:
Hausa Intelligence Chatbot System. 206-219 - Himanshu Gupta, Sanjay Misra, Lov Kumar

, N. L. Bhanu Murthy:
An Empirical Study to Investigate Data Sampling Techniques for Improving Code-Smell Prediction Using Imbalanced Data. 220-233 - Nuhu Yusuf, Mohd Amin Mohd Yunus

, Norfaradilla Wahid, Mohd. Najib Mohd. Salleh
:
A Statistical Linguistic Terms Interrelationship Approach to Query Expansion Based on Terms Selection Value. 234-244 - Tatjana Sidekerskiene

, Robertas Damasevicius, Rytis Maskeliunas
:
Validation of Student Psychological Player Types for Game-Based Learning in University Math Lectures. 245-258 - Nwodo Benita Chikodili

, Mohammed D. Abdulmalik
, Opeyemi Aderiike Abisoye
, Sulaimon Adebayo Bashir
:
Outlier Detection in Multivariate Time Series Data Using a Fusion of K-Medoid, Standardized Euclidean Distance and Z-Score. 259-271 - Idowu Dauda Oladipo

, Abdulrauph Olarewaju Babatunde, Joseph Bamidele Awotunde
, Muyideen Abdulraheem
:
An Improved Hybridization in the Diagnosis of Diabetes Mellitus Using Selected Computational Intelligence. 272-285 - Olamatanmi J. Mebawondu

, Olufunso D. Alowolodu
, Adebayo Olusola Adetunmbi
, Jacob O. Mebawondu
:
Optimizing the Classification of Network Intrusion Detection Using Ensembles of Decision Trees Algorithm. 286-300 - Zakari Hassan Mohammed

, Ishaq Oyebisi Oyefolahan
, Mohammed D. Abdulmalik
, Sulaimon Adebayo Bashir
:
Identification of Bacterial Leaf Blight and Powdery Mildew Diseases Based on a Combination of Histogram of Oriented Gradient and Local Binary Pattern Features. 301-314 - Olamatanmi J. Mebawondu

, Adebayo Olusola Adetunmbi
, Jacob O. Mebawondu
, Olufunso D. Alowolodu
:
Feature Weighting and Classification Modeling for Network Intrusion Detection Using Machine Learning Algorithms. 315-327 - Christopher Bahago Martins

, Emmanuel Adewale Adedokun, Ime Umoh Jarlath, Muhammed Bashir Mu'azu:
Spoof Detection in a Zigbee Network Using Forge-Resistant Network Characteristics (RSSI and LQI). 328-339 - Ogbuka Mary Kenneth

, Sulaimon Adebayo Bashir
, Opeyemi Aderiike Abisoye
, Abdulmalik Danlami Mohammed
:
Face Morphing Attack Detection in the Presence of Post-processed Image Sources Using Neighborhood Component Analysis and Decision Tree Classifier. 340-354 - Idris Abdulmumin

, Bashir Shehu Galadanci, Abubakar Isa:
Enhanced Back-Translation for Low Resource Neural Machine Translation Using Self-training. 355-371
Information Security Privacy and Trust
- Omoniyi Wale Salami

, Yuri Demchenko, Emmanuel Adewale Adedokun
, Muhammed Bashir Mu'azu:
SIMP-REAUTH: A Simple Multilevel Real User Remote Authentication Scheme for Mobile Cloud Computing. 375-388 - Ahmed Tijani Salawudeen

, Abdulrahman Adebayo Olaniyan
, Gbenga Abidemi Olarinoye
, Tajudeen Humble Sikiru
:
Formulation and Optimization of Overcurrent Relay Coordination in Distribution Networks Using Metaheuristic Algorithms. 389-402 - Adebayo Omotosho

, Divine Awazie, Peace Ayegba
, Justice Emuoyibofarhe
:
A Gamified Technique to Improve Users' Phishing and Typosquatting Awareness. 403-414 - Abraham Ayegba Alfa

, John Kolo Alhassan
, Olayemi Mikail Olaniyi
, Morufu Olalere
:
Sooner Lightweight Cryptosystem: Towards Privacy Preservation of Resource-Constrained Devices. 415-429 - Noel Moses Dogonyaro, Victor Onomza Waziri, Abdulhamid Muhammad Shafii, Salisu Lukman Obada:

Comparative Performance Analysis of Anti-virus Software. 430-443 - Muyideen Abdulraheem

, Joseph Bamidele Awotunde
, Rasheed Gbenga Jimoh
, Idowu Dauda Oladipo
:
An Efficient Lightweight Cryptographic Algorithm for IoT Security. 444-456 - Olawale Surajudeen Adebayo

, Joel Sokoyebom Anyam, Shefiu Olusegun Ganiyu, Sule Ajiboye Salawu:
Analysis and Classification of Some Selected Media Apps Vulnerability. 457-469 - Ali Usman Abdullahi

, Stephany Adamu, Ali Muhammad Usman, Munir Adewoye, Mustapha Abubakar Yusuf, Enem Theophlus Aniemeka, Haruna Chiroma:
Appraisal of Electronic Banking Acceptance in Nigeria Amidst Cyber Attacks Using Unified Theory of Acceptance and Use of Technology. 470-481
Information Science and Technology
- Ghaida Albakri, Rahma Bouaziz:

A Scoping Review of the Literature on the Current Mental Health Status of Developers. 485-496 - Guillermo Rodríguez

, Alfredo Teyseyre
, Pablo Gonzalez, Sanjay Misra:
Gamifying Users' Learning Experience of Scrum. 497-509 - Nadera Aljawabrah

, Abdallah Qusef, Tamás Gergely, Adhyatmananda Pati:
Visualizing Multilevel Test-to-Code Relations. 510-519 - Muhammad Kudu Muhammad, Ishaq Oyebisi Oyefolahan, Olayemi Mikail Olaniyi, Joseph Adebayo Ojeniyi:

Privacy Preservation in Mobile-Based Learning Systems: Current Trends, Methodologies, Challenges, Opportunities and Future Direction. 520-534 - Roseline Oluwaseun Ogundokun

, Joseph Bamidele Awotunde
, Sanjay Misra, Dennison Oluwatobi Umoru:
Drug Verification System Using Quick Response Code. 535-545 - Bilkisu Larai Muhammad-Bello

, Mudi Lukman, Mudi Salim:
A Novel Approach to News Archiving from Newswires. 546-559 - Blessing Iganya Attah, John Kolo Alhassan

, Ishaq Oyebisi Oyefolahan, Sulaimon Adebayo Bashir
:
Mobile Application Software Usability Evaluation: Issues, Methods and Future Research Directions. 560-573 - Adebayo Omotosho

, Peace Ayegba
, Justice Emuoyibofarhe
:
Perception of Social Media Privacy Among Computer Science Students. 574-587 - Aola Yousfi, Moulay Hafid El Yazidi, Ahmed Zellou

:
An Efficient Holistic Schema Matching Approach. 588-601 - Hamzat Olanrewaju Aliyu, Oumar Y. Maïga:

AnnoGram4MD: A Language for Annotating Grammars for High Quality Metamodel Derivation. 602-617 - Olamilekan Shobayo, Ayobami Olajube

, Obina Okoyeigbo
, Jesse Ogbonna:
Design and Implementation of an IoT Based Baggage Tracking System. 618-631 - Rabi Mustapha, Muhammed Auwal Ahmed, Muhammad Aminu Ahmad

:
Validation of Computational-Rabi's Driver Training Model for Prime Decision-Making. 632-644 - Shariq Aziz Butt

, Sanjay Misra, Jorge Luis Díaz Martinez, Emiro De la Hoz-Franco:
Efficient Approaches to Agile Cost Estimation in Software Industries: A Project-Based Case Study. 645-659 - Ayuba Peter

, Babangida Zachariah
, Luhutyit Peter Damuut
, Sa'adatu Abdulkadir
:
Efficient Traffic Control System Using Fuzzy Logic with Priority. 660-674 - Enesi Femi Aminu, Ishaq Oyebisi Oyefolahan, Muhammad Bashir Abdullahi, Muhammadu Tajudeen Salaudeen:

An Enhanced WordNet Query Expansion Approach for Ontology Based Information Retrieval System. 675-688 - Bala Alhaji Salihu, Lukman Adewale Ajao

, Sanusi Adeiza Audu, Blessing Olatunde Abisoye
:
Design of a Robotic Wearable Shoes for Locomotion Assistance System. 689-702 - Saka John, Jacob O. Mebawondu

, Olusola O. Ajayi, Mebawondu O. Josephine:
Design of Cash Advance Payment System in a Developing Country: A Case Study of First Bank of Nigeria Mortgages Limited. 703-714 - Rebecca Chidimma Ojobor

:
Users' Perception of the Telecommunication Technologies Used for Improving Service Delivery at Federal University Libraries in Anambra and Enugu State. 715-726 - Sanjay Misra:

A Step by Step Guide for Choosing Project Topics and Writing Research Papers in ICT Related Disciplines. 727-744

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







last updated on 2026-05-01 23:23 CEST by the 







