


default search action
ICIIA 2021: Ota, Nigeria
- Sanjay Misra

, Jonathan Oluranti, Robertas Damasevicius, Rytis Maskeliunas
:
Informatics and Intelligent Applications - First International Conference, ICIIA 2021, Ota, Nigeria, November 25-27, 2021, Revised Selected Papers. Communications in Computer and Information Science 1547, Springer 2022, ISBN 978-3-030-95629-5
AI Applications
- Fabricio Echeverria

, Marcelo León
, Zila Esteves
, Carlos Redroban
:
Variation of the Intercession Coefficient Used as a Hyper Parameter in Machine Learning in Regression Models. 3-19 - Akintunde Saminu, Olusegun Folorunso, Femi Johnson, Joel Akerele, Solanke Ilesanmi, Folurera Ajayi:

Adaptive Neuro-Fuzzy Model for Vehicle Theft Prediction and Recovery. 20-34 - Sakinat Oluwabukonla Folorunso

, Joseph Bamidele Awotunde
, Emmanuel Abidemi Adeniyi
, Moses Kazeem Abiodun
, Femi Emmanuel Ayo
:
Heart Disease Classification Using Machine Learning Models. 35-49 - Joseph Bamidele Awotunde

, Moses Kazeem Abiodun
, Emmanuel Abidemi Adeniyi
, Sakinat Oluwabukonla Folorunso
, Rasheed Gbenga Jimoh
:
A Deep Learning-Based Intrusion Detection Technique for a Secured IoMT System. 50-62 - Moses Kazeem Abiodun

, Emmanuel Abidemi Adeniyi
, Dayo Reuben Aremu
, Joseph Bamidele Awotunde
, Emmanuel Ogbuji:
Predicting Students Performance in Examination Using Supervised Data Mining Techniques. 63-77 - Emmanuel Adetiba

, Matthew Boladele Akanle
, Victor Akande, Joke A. Badejo
, Vingi Patrick Nzanzu, Mbasa Joaquim Molo, Victoria Wumi Oguntosin, Oluwadamilola Oshin, Ezekiel F. Adebiyi
:
FEDGEN Testbed: A Federated Genomics Private Cloud Infrastructure for Precision Medicine and Artificial Intelligence Research. 78-91 - Usman Haruna

, Jaafar Zubairu Maitama, Murtala Mohammed, Ram Gopal Raj:
Predicting the Outcomes of Football Matches Using Machine Learning Approach. 92-104
Information Security
- Mouhamed Lamine Mbaye, Demba Sow, Djiby Sow:

The Post-quantum Probabilistic Signature Scheme. 107-120 - Samuel Akwasi Danso, Liping Shang

, Hu Deng
, Justice Odoom
, Quancheng Liu
, Emmanuel Appiah
, Etse Dablu Bobobee
:
Deploying Wavelet Transforms in Enhancing Terahertz Active Security Images. 121-137 - Omoniyi Wale Salami

, Abdulrazaq Muhammad Bashir
, Emmanuel Adewale Adedokun
, Yahaya Basira
:
Collaborative Integrity Verification for Blockchain-Based Cloud Forensic Readiness Data Protection. 138-152 - Arunesh Kumar

, Christina Eunice John, A. Joshua, Baskaran Kaliamourthy, Chamundeswari Arumugam
:
State Based IoT Security for Tamper Prevention. 153-164 - Prabhjot Kaur, Shiv Patel, Sanjana Mittal, Surbhi Sharma, Sergey Butakov:

Exploring the Security of Software Defined Network Controllers. 165-178 - Kush Patel, Krishna Vyas, Monika Patel, Dhruv Vyas, Sergey Butakov:

Privacy Protection in Geolocation Monitoring Applications. 179-193
Emerging Technologies in Informatics
- Israel Edem Agbehadji

, Richard C. Millham
, Bankole Osita Awuzie, Alfred Beati Ngowi
:
Stakeholder's Perspective of Digital Technologies and Platforms Towards Smart Campus Transition: Challenges and Prospects. 197-213 - Samuel Ofori Frimpong

, Richard C. Millham
, Israel Edem Agbehadji
, Jason J. Jung
:
Social Spider and the Prey Search Method for Global Optimization in Hyper Dimensional Search Space. 214-226 - Marcelo Chávez

, Broderick Crawford
, Ricardo Soto
, Wenceslao Palma
, Marcelo Becerra-Rozas
, Felipe Cisternas-Caneo
, Gino Astorga, Sanjay Misra
:
Population Size Management in a Cuckoo Search Algorithm Solving Combinatorial Problems. 227-239 - Israel Edem Agbehadji

, Bankole Osita Awuzie, Alfred Beati Ngowi
, Richard C. Millham
, Samuel Ofori Frimpong
:
Global Optimization: A Hybrid Social Spider-Prey and Kestrel-Based Search Strategy in Multi-dimensional Search Space. 240-255 - Emmanuel Abidemi Adeniyi

, Joseph Bamidele Awotunde
, Moses Kazeem Abiodun
, Wareez Olasunkanmi Adeboye, Gbemisola Janet Ajamu
:
Development of Secured Smart Display for Art Industry. 256-267 - Nikolay Voit

, Semen Bochkov
:
Method to Interpret Algorithms and Design Workflows in the Complex Computer-Aided Design Development. 268-282 - Abodunrin AbdulGafar Adigun, Chika Yinka-Banjo:

Comparing Stochastic Gradient Descent and Mini-batch Gradient Descent Algorithms in Loan Risk Assessment. 283-296 - Guillermo Rodríguez, Jorge Andrés Díaz Pace, Luis Berdún, Sanjay Misra

:
Deriving Architectural Responsibilities from Textual Requirements. 297-310 - Adesoji Adesina, Ayodele Ariyo Adebiyi, Charles Korede Ayo:

Extending Traceability Technique to Client Forensic Investigation. 311-324

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














