default search action
ICTA 2020: Minna, Nigeria
- Sanjay Misra, Bilkisu Larai Muhammad-Bello:
Information and Communication Technology and Applications - Third International Conference, ICTA 2020, Minna, Nigeria, November 24-27, 2020, Revised Selected Papers. Communications in Computer and Information Science 1350, Springer 2021, ISBN 978-3-030-69142-4
Artificial Intelligence, Big Data and Machine Learning
- Rytis Maskeliunas, Andrius Lauraitis, Robertas Damasevicius, Sanjay Misra:
Multi-class Model MOV-OVR for Automatic Evaluation of Tremor Disorders in Huntington's Disease. 3-14 - Aliyu Mustapha, Abdullahi Kutiriko Abubakar, Haruna Dokoro Ahmed, Abdulkadir Mohammed:
Application of Big Data Analytics for Improving Learning Process in Technical Vocational Education and Training. 15-25 - Ananya Misra:
A Survey for Recommender System for Groups. 26-40 - Joseph Bamidele Awotunde, Rasheed Gbenga Jimoh, Idowu Dauda Oladipo, Muyideen Abdulraheem:
Prediction of Malaria Fever Using Long-Short-Term Memory and Big Data. 41-53 - Ochilbek Rakhmanov, Senol Dane:
Improving the Prediction Accuracy of Academic Performance of the Freshman Using Wonderlic Personnel Test and Rey-Osterrieth Complex Figure. 54-65 - Jacob O. Mebawondu:
Comparative Analyses of Machine Learning Paradigms for Operators' Voice Call Quality of Service. 66-79 - Salefu Ngbede Odaudu, Ime J. Umoh, Emmanuel Adewale Adedokun, Chukwuma Jonathan:
LearnFuse: An Efficient Distributed Big Data Fusion Architecture Using Ensemble Learning Technique. 80-92 - Isabona Joseph, Ojuh O. Divine:
A Gaussian Mixture Model with Firm Expectation-Maximization Algorithm for Effective Signal Power Coverage Estimation. 93-106 - Sujata Panda, Hima Bindu Maringanti:
Analysis and Classification of Biomedical Data Using Machine Learning Techniques. 107-118 - Akshat Agrawal, Anurag Jain:
Emotion Recognition of Speech in Hindi Using Dimensionality Reduction and Machine Learning Techniques. 119-129 - Ojuh O. Divine, Isabona Joseph:
Application of Supervised Machine Learning Based on Gaussian Process Regression for Extrapolative Cell Availability Evaluation in Cellular Communication Systems. 130-144 - Gyunka Benjamin Aruwa, Oluwakemi Christiana Abikoye, Adekeye S. Adekunle:
Anomaly Android Malware Detection: A Comparative Analysis of Six Classifiers. 145-157 - Kayode Omotosho Alabi, Sulaiman Olaniyi Abdulsalam, Roseline Oluwaseun Ogundokun, Micheal Olaolu Arowolo:
Credit Risk Prediction in Commercial Bank Using Chi-Square with SVM-RBF. 158-169 - Adam Adenike Azeezat, Onashoga Sadiat Adebukola, Adebayo Abayomi-Alli, Omoyiola Bayo Olushola:
A Conceptual Hybrid Model of Deep Convolutional Neural Network (DCNN) and Long Short-Term Memory (LSTM) for Masquerade Attack Detection. 170-184 - Ochilbek Rakhmanov:
An Automated Framework for Swift Lecture Evaluation Using Speech Recognition and NLP. 185-195 - Emmanuel Adetiba, Amarachi E. Opara, Oluwaseun T. Ajayi, Folashade O. Owolabi:
DeepFacematch: A Convolutional Neural Network Model for Contactless Attendance on e-SIWES Portal. 196-205 - Usman Haruna, Umar Sunusi Maitalata, Murtala Mohammed, Jaafar Zubairu Maitama:
Hausa Intelligence Chatbot System. 206-219 - Himanshu Gupta, Sanjay Misra, Lov Kumar, N. L. Bhanu Murthy:
An Empirical Study to Investigate Data Sampling Techniques for Improving Code-Smell Prediction Using Imbalanced Data. 220-233 - Nuhu Yusuf, Mohd Amin Mohd Yunus, Norfaradilla Wahid, Mohd. Najib Mohd. Salleh:
A Statistical Linguistic Terms Interrelationship Approach to Query Expansion Based on Terms Selection Value. 234-244 - Tatjana Sidekerskiene, Robertas Damasevicius, Rytis Maskeliunas:
Validation of Student Psychological Player Types for Game-Based Learning in University Math Lectures. 245-258 - Nwodo Benita Chikodili, Mohammed D. Abdulmalik, Opeyemi Aderiike Abisoye, Sulaimon Adebayo Bashir:
Outlier Detection in Multivariate Time Series Data Using a Fusion of K-Medoid, Standardized Euclidean Distance and Z-Score. 259-271 - Idowu Dauda Oladipo, Abdulrauph Olarewaju Babatunde, Joseph Bamidele Awotunde, Muyideen Abdulraheem:
An Improved Hybridization in the Diagnosis of Diabetes Mellitus Using Selected Computational Intelligence. 272-285 - Olamatanmi J. Mebawondu, Olufunso D. Alowolodu, Adebayo Olusola Adetunmbi, Jacob O. Mebawondu:
Optimizing the Classification of Network Intrusion Detection Using Ensembles of Decision Trees Algorithm. 286-300 - Zakari Hassan Mohammed, Ishaq Oyebisi Oyefolahan, Mohammed D. Abdulmalik, Sulaimon Adebayo Bashir:
Identification of Bacterial Leaf Blight and Powdery Mildew Diseases Based on a Combination of Histogram of Oriented Gradient and Local Binary Pattern Features. 301-314 - Olamatanmi J. Mebawondu, Adebayo Olusola Adetunmbi, Jacob O. Mebawondu, Olufunso D. Alowolodu:
Feature Weighting and Classification Modeling for Network Intrusion Detection Using Machine Learning Algorithms. 315-327 - Christopher Bahago Martins, Emmanuel Adewale Adedokun, Ime Umoh Jarlath, Muhammed Bashir Mu'azu:
Spoof Detection in a Zigbee Network Using Forge-Resistant Network Characteristics (RSSI and LQI). 328-339 - Ogbuka Mary Kenneth, Sulaimon Adebayo Bashir, Opeyemi Aderiike Abisoye, Abdulmalik Danlami Mohammed:
Face Morphing Attack Detection in the Presence of Post-processed Image Sources Using Neighborhood Component Analysis and Decision Tree Classifier. 340-354 - Idris Abdulmumin, Bashir Shehu Galadanci, Abubakar Isa:
Enhanced Back-Translation for Low Resource Neural Machine Translation Using Self-training. 355-371
Information Security Privacy and Trust
- Omoniyi Wale Salami, Yuri Demchenko, Emmanuel Adewale Adedokun, Muhammed Bashir Mu'azu:
SIMP-REAUTH: A Simple Multilevel Real User Remote Authentication Scheme for Mobile Cloud Computing. 375-388 - Ahmed Tijani Salawudeen, Abdulrahman Adebayo Olaniyan, Gbenga Abidemi Olarinoye, Tajudeen Humble Sikiru:
Formulation and Optimization of Overcurrent Relay Coordination in Distribution Networks Using Metaheuristic Algorithms. 389-402 - Adebayo Omotosho, Divine Awazie, Peace Ayegba, Justice Emuoyibofarhe:
A Gamified Technique to Improve Users' Phishing and Typosquatting Awareness. 403-414 - Abraham Ayegba Alfa, John Kolo Alhassan, Olayemi Mikail Olaniyi, Morufu Olalere:
Sooner Lightweight Cryptosystem: Towards Privacy Preservation of Resource-Constrained Devices. 415-429 - Noel Moses Dogonyaro, Victor Onomza Waziri, Abdulhamid Muhammad Shafii, Salisu Lukman Obada:
Comparative Performance Analysis of Anti-virus Software. 430-443 - Muyideen Abdulraheem, Joseph Bamidele Awotunde, Rasheed Gbenga Jimoh, Idowu Dauda Oladipo:
An Efficient Lightweight Cryptographic Algorithm for IoT Security. 444-456 - Olawale Surajudeen Adebayo, Joel Sokoyebom Anyam, Shefiu Olusegun Ganiyu, Sule Ajiboye Salawu:
Analysis and Classification of Some Selected Media Apps Vulnerability. 457-469 - Ali Usman Abdullahi, Stephany Adamu, Ali Muhammad Usman, Munir Adewoye, Mustapha Abubakar Yusuf, Enem Theophlus Aniemeka, Haruna Chiroma:
Appraisal of Electronic Banking Acceptance in Nigeria Amidst Cyber Attacks Using Unified Theory of Acceptance and Use of Technology. 470-481
Information Science and Technology
- Ghaida Albakri, Rahma Bouaziz:
A Scoping Review of the Literature on the Current Mental Health Status of Developers. 485-496 - Guillermo Rodríguez, Alfredo Teyseyre, Pablo Gonzalez, Sanjay Misra:
Gamifying Users' Learning Experience of Scrum. 497-509 - Nadera Aljawabrah, Abdallah Qusef, Tamás Gergely, Adhyatmananda Pati:
Visualizing Multilevel Test-to-Code Relations. 510-519 - Muhammad Kudu Muhammad, Ishaq Oyebisi Oyefolahan, Olayemi Mikail Olaniyi, Joseph Adebayo Ojeniyi:
Privacy Preservation in Mobile-Based Learning Systems: Current Trends, Methodologies, Challenges, Opportunities and Future Direction. 520-534 - Roseline Oluwaseun Ogundokun, Joseph Bamidele Awotunde, Sanjay Misra, Dennison Oluwatobi Umoru:
Drug Verification System Using Quick Response Code. 535-545 - Bilkisu Larai Muhammad-Bello, Mudi Lukman, Mudi Salim:
A Novel Approach to News Archiving from Newswires. 546-559 - Blessing Iganya Attah, John Kolo Alhassan, Ishaq Oyebisi Oyefolahan, Sulaimon Adebayo Bashir:
Mobile Application Software Usability Evaluation: Issues, Methods and Future Research Directions. 560-573 - Adebayo Omotosho, Peace Ayegba, Justice Emuoyibofarhe:
Perception of Social Media Privacy Among Computer Science Students. 574-587 - Aola Yousfi, Moulay Hafid El Yazidi, Ahmed Zellou:
An Efficient Holistic Schema Matching Approach. 588-601 - Hamzat Olanrewaju Aliyu, Oumar Y. Maïga:
AnnoGram4MD: A Language for Annotating Grammars for High Quality Metamodel Derivation. 602-617 - Olamilekan Shobayo, Ayobami Olajube, Obina Okoyeigbo, Jesse Ogbonna:
Design and Implementation of an IoT Based Baggage Tracking System. 618-631 - Rabi Mustapha, Muhammed Auwal Ahmed, Muhammad Aminu Ahmad:
Validation of Computational-Rabi's Driver Training Model for Prime Decision-Making. 632-644 - Shariq Aziz Butt, Sanjay Misra, Jorge Luis Díaz Martinez, Emiro De la Hoz-Franco:
Efficient Approaches to Agile Cost Estimation in Software Industries: A Project-Based Case Study. 645-659 - Ayuba Peter, Babangida Zachariah, Luhutyit Peter Damuut, Sa'adatu Abdulkadir:
Efficient Traffic Control System Using Fuzzy Logic with Priority. 660-674 - Enesi Femi Aminu, Ishaq Oyebisi Oyefolahan, Muhammad Bashir Abdullahi, Muhammadu Tajudeen Salaudeen:
An Enhanced WordNet Query Expansion Approach for Ontology Based Information Retrieval System. 675-688 - Bala Alhaji Salihu, Lukman Adewale Ajao, Sanusi Adeiza Audu, Blessing Olatunde Abisoye:
Design of a Robotic Wearable Shoes for Locomotion Assistance System. 689-702 - Saka John, Jacob O. Mebawondu, Olusola O. Ajayi, Mebawondu O. Josephine:
Design of Cash Advance Payment System in a Developing Country: A Case Study of First Bank of Nigeria Mortgages Limited. 703-714 - Rebecca Chidimma Ojobor:
Users' Perception of the Telecommunication Technologies Used for Improving Service Delivery at Federal University Libraries in Anambra and Enugu State. 715-726 - Sanjay Misra:
A Step by Step Guide for Choosing Project Topics and Writing Research Papers in ICT Related Disciplines. 727-744
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.