


default search action
ICIIA 2021: Ota, Nigeria
- Sanjay Misra
, Jonathan Oluranti, Robertas Damasevicius, Rytis Maskeliunas
:
Informatics and Intelligent Applications - First International Conference, ICIIA 2021, Ota, Nigeria, November 25-27, 2021, Revised Selected Papers. Communications in Computer and Information Science 1547, Springer 2022, ISBN 978-3-030-95629-5
AI Applications
- Fabricio Echeverria
, Marcelo León
, Zila Esteves
, Carlos Redroban
:
Variation of the Intercession Coefficient Used as a Hyper Parameter in Machine Learning in Regression Models. 3-19 - Akintunde Saminu, Olusegun Folorunso, Femi Johnson, Joel Akerele, Solanke Ilesanmi, Folurera Ajayi:
Adaptive Neuro-Fuzzy Model for Vehicle Theft Prediction and Recovery. 20-34 - Sakinat Oluwabukonla Folorunso
, Joseph Bamidele Awotunde
, Emmanuel Abidemi Adeniyi
, Moses Kazeem Abiodun
, Femi Emmanuel Ayo
:
Heart Disease Classification Using Machine Learning Models. 35-49 - Joseph Bamidele Awotunde
, Moses Kazeem Abiodun
, Emmanuel Abidemi Adeniyi
, Sakinat Oluwabukonla Folorunso
, Rasheed Gbenga Jimoh
:
A Deep Learning-Based Intrusion Detection Technique for a Secured IoMT System. 50-62 - Moses Kazeem Abiodun
, Emmanuel Abidemi Adeniyi
, Dayo Reuben Aremu
, Joseph Bamidele Awotunde
, Emmanuel Ogbuji:
Predicting Students Performance in Examination Using Supervised Data Mining Techniques. 63-77 - Emmanuel Adetiba
, Matthew Boladele Akanle
, Victor Akande, Joke A. Badejo
, Vingi Patrick Nzanzu, Mbasa Joaquim Molo, Victoria Wumi Oguntosin, Oluwadamilola Oshin, Ezekiel F. Adebiyi:
FEDGEN Testbed: A Federated Genomics Private Cloud Infrastructure for Precision Medicine and Artificial Intelligence Research. 78-91 - Usman Haruna
, Jaafar Zubairu Maitama, Murtala Mohammed, Ram Gopal Raj:
Predicting the Outcomes of Football Matches Using Machine Learning Approach. 92-104
Information Security
- Mouhamed Lamine Mbaye, Demba Sow, Djiby Sow:
The Post-quantum Probabilistic Signature Scheme. 107-120 - Samuel Akwasi Danso, Liping Shang
, Hu Deng
, Justice Odoom
, Quancheng Liu
, Emmanuel Appiah
, Etse Bobobee
:
Deploying Wavelet Transforms in Enhancing Terahertz Active Security Images. 121-137 - Omoniyi Wale Salami
, Abdulrazaq Muhammad Bashir
, Emmanuel Adewale Adedokun
, Yahaya Basira
:
Collaborative Integrity Verification for Blockchain-Based Cloud Forensic Readiness Data Protection. 138-152 - Arunesh Kumar
, Christina Eunice John, A. Joshua, Baskaran Kaliamourthy, Chamundeswari Arumugam
:
State Based IoT Security for Tamper Prevention. 153-164 - Prabhjot Kaur, Shiv Patel, Sanjana Mittal, Surbhi Sharma, Sergey Butakov:
Exploring the Security of Software Defined Network Controllers. 165-178 - Kush Patel, Krishna Vyas, Monika Patel, Dhruv Vyas, Sergey Butakov:
Privacy Protection in Geolocation Monitoring Applications. 179-193
Emerging Technologies in Informatics
- Israel Edem Agbehadji
, Richard C. Millham
, Bankole Osita Awuzie, Alfred Beati Ngowi
:
Stakeholder's Perspective of Digital Technologies and Platforms Towards Smart Campus Transition: Challenges and Prospects. 197-213 - Samuel Ofori Frimpong
, Richard C. Millham
, Israel Edem Agbehadji
, Jason J. Jung
:
Social Spider and the Prey Search Method for Global Optimization in Hyper Dimensional Search Space. 214-226 - Marcelo Chávez
, Broderick Crawford
, Ricardo Soto
, Wenceslao Palma
, Marcelo Becerra-Rozas
, Felipe Cisternas-Caneo
, Gino Astorga, Sanjay Misra
:
Population Size Management in a Cuckoo Search Algorithm Solving Combinatorial Problems. 227-239 - Israel Edem Agbehadji
, Bankole Osita Awuzie, Alfred Beati Ngowi
, Richard C. Millham
, Samuel Ofori Frimpong
:
Global Optimization: A Hybrid Social Spider-Prey and Kestrel-Based Search Strategy in Multi-dimensional Search Space. 240-255 - Emmanuel Abidemi Adeniyi
, Joseph Bamidele Awotunde
, Moses Kazeem Abiodun
, Wareez Olasunkanmi Adeboye, Gbemisola Janet Ajamu
:
Development of Secured Smart Display for Art Industry. 256-267 - Nikolay Voit
, Semen Bochkov
:
Method to Interpret Algorithms and Design Workflows in the Complex Computer-Aided Design Development. 268-282 - Abodunrin AbdulGafar Adigun, Chika Yinka-Banjo:
Comparing Stochastic Gradient Descent and Mini-batch Gradient Descent Algorithms in Loan Risk Assessment. 283-296 - Guillermo Rodríguez, Jorge Andrés Díaz Pace, Luis Berdún, Sanjay Misra
:
Deriving Architectural Responsibilities from Textual Requirements. 297-310 - Adesoji Adesina, Ayodele Ariyo Adebiyi, Charles Korede Ayo:
Extending Traceability Technique to Client Forensic Investigation. 311-324

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.