Abstract is missing.
- Multi-class Model MOV-OVR for Automatic Evaluation of Tremor Disorders in Huntington's DiseaseRytis Maskeliunas, Andrius Lauraitis, Robertas Damasevicius, Sanjay Misra. 3-14 [doi]
- Application of Big Data Analytics for Improving Learning Process in Technical Vocational Education and TrainingAliyu Mustapha, Abdullahi Kutiriko Abubakar, Haruna Dokoro Ahmed, Abdulkadir Mohammed. 15-25 [doi]
- A Survey for Recommender System for GroupsAnanya Misra. 26-40 [doi]
- Prediction of Malaria Fever Using Long-Short-Term Memory and Big DataJoseph Bamidele Awotunde, Rasheed Gbenga Jimoh, Idowu Dauda Oladipo, Muyideen Abdulraheem. 41-53 [doi]
- Improving the Prediction Accuracy of Academic Performance of the Freshman Using Wonderlic Personnel Test and Rey-Osterrieth Complex FigureOchilbek Rakhmanov, Senol Dane. 54-65 [doi]
- Comparative Analyses of Machine Learning Paradigms for Operators' Voice Call Quality of ServiceJacob O. Mebawondu. 66-79 [doi]
- LearnFuse: An Efficient Distributed Big Data Fusion Architecture Using Ensemble Learning TechniqueSalefu Ngbede Odaudu, Ime J. Umoh, Emmanuel A. Adedokun, Chukwuma Jonathan. 80-92 [doi]
- A Gaussian Mixture Model with Firm Expectation-Maximization Algorithm for Effective Signal Power Coverage EstimationIsabona Joseph, Ojuh O. Divine. 93-106 [doi]
- Analysis and Classification of Biomedical Data Using Machine Learning TechniquesSujata Panda, Hima Bindu Maringanti. 107-118 [doi]
- Emotion Recognition of Speech in Hindi Using Dimensionality Reduction and Machine Learning TechniquesAkshat Agrawal, Anurag Jain. 119-129 [doi]
- Application of Supervised Machine Learning Based on Gaussian Process Regression for Extrapolative Cell Availability Evaluation in Cellular Communication SystemsOjuh O. Divine, Isabona Joseph. 130-144 [doi]
- Anomaly Android Malware Detection: A Comparative Analysis of Six ClassifiersGyunka Benjamin Aruwa, Oluwakemi Christiana Abikoye, Adekeye S. Adekunle. 145-157 [doi]
- Credit Risk Prediction in Commercial Bank Using Chi-Square with SVM-RBFKayode Omotosho Alabi, Sulaiman Olaniyi Abdulsalam, Roseline Oluwaseun Ogundokun, Micheal Olaolu Arowolo. 158-169 [doi]
- A Conceptual Hybrid Model of Deep Convolutional Neural Network (DCNN) and Long Short-Term Memory (LSTM) for Masquerade Attack DetectionAdam Adenike Azeezat, Onashoga Sadiat Adebukola, Adebayo Abayomi-Alli, Omoyiola Bayo Olushola. 170-184 [doi]
- An Automated Framework for Swift Lecture Evaluation Using Speech Recognition and NLPOchilbek Rakhmanov. 185-195 [doi]
- DeepFacematch: A Convolutional Neural Network Model for Contactless Attendance on e-SIWES PortalEmmanuel Adetiba, Amarachi E. Opara, Oluwaseun T. Ajayi, Folashade O. Owolabi. 196-205 [doi]
- Hausa Intelligence Chatbot SystemUsman Haruna, Umar Sunusi Maitalata, Murtala Mohammed, Jaafar Zubairu Maitama. 206-219 [doi]
- An Empirical Study to Investigate Data Sampling Techniques for Improving Code-Smell Prediction Using Imbalanced DataHimanshu Gupta, Sanjay Misra, Lov Kumar, N. L. Bhanu Murthy. 220-233 [doi]
- A Statistical Linguistic Terms Interrelationship Approach to Query Expansion Based on Terms Selection ValueNuhu Yusuf, Mohd Amin Mohd Yunus, Norfaradilla Wahid, Mohd Najib Mohd Salleh. 234-244 [doi]
- Validation of Student Psychological Player Types for Game-Based Learning in University Math LecturesTatjana Sidekerskiene, Robertas Damasevicius, Rytis Maskeliunas. 245-258 [doi]
- Outlier Detection in Multivariate Time Series Data Using a Fusion of K-Medoid, Standardized Euclidean Distance and Z-ScoreNwodo Benita Chikodili, Mohammed D. Abdulmalik, Opeyemi A. Abisoye, Sulaimon A. Bashir. 259-271 [doi]
- An Improved Hybridization in the Diagnosis of Diabetes Mellitus Using Selected Computational IntelligenceIdowu Dauda Oladipo, Abdulrauph Olarewaju Babatunde, Joseph Bamidele Awotunde, Muyideen Abdulraheem. 272-285 [doi]
- Optimizing the Classification of Network Intrusion Detection Using Ensembles of Decision Trees AlgorithmOlamatanmi J. Mebawondu, Olufunso D. Alowolodu, Adebayo O. Adetunmbi, Jacob O. Mebawondu. 286-300 [doi]
- Identification of Bacterial Leaf Blight and Powdery Mildew Diseases Based on a Combination of Histogram of Oriented Gradient and Local Binary Pattern FeaturesZakari Hassan Mohammed, Oyefolahan I. O, Mohammed D. Abdulmalik, Sulaimon A. Bashir. 301-314 [doi]
- Feature Weighting and Classification Modeling for Network Intrusion Detection Using Machine Learning AlgorithmsOlamatanmi J. Mebawondu, Adebayo O. Adetunmbi, Jacob O. Mebawondu, Olufunso D. Alowolodu. 315-327 [doi]
- Spoof Detection in a Zigbee Network Using Forge-Resistant Network Characteristics (RSSI and LQI)Christopher Bahago Martins, Emmanuel Adedokun Adewale, Ime Umoh Jarlath, Muhammed Bashir Mu'azu. 328-339 [doi]
- Face Morphing Attack Detection in the Presence of Post-processed Image Sources Using Neighborhood Component Analysis and Decision Tree ClassifierOgbuka Mary Kenneth, Sulaimon Adebayo Bashir, Opeyemi Aderiike Abisoye, Abdulmalik Danlami Mohammed. 340-354 [doi]
- Enhanced Back-Translation for Low Resource Neural Machine Translation Using Self-trainingIdris Abdulmumin, Bashir Shehu Galadanci, Abubakar Isa. 355-371 [doi]
- SIMP-REAUTH: A Simple Multilevel Real User Remote Authentication Scheme for Mobile Cloud ComputingOmoniyi Wale Salami, Yuri Demchenko, Emmanuel Adewale Adedokun, Muhammed Bashir Mu'azu. 375-388 [doi]
- Formulation and Optimization of Overcurrent Relay Coordination in Distribution Networks Using Metaheuristic AlgorithmsAhmed Tijani Salawudeen, Abdulrahman Adebayo Olaniyan, Gbenga Abidemi Olarinoye, Tajudeen Humble Sikiru. 389-402 [doi]
- A Gamified Technique to Improve Users' Phishing and Typosquatting AwarenessAdebayo Omotosho, Divine Awazie, Peace Ayegba, Justice Emuoyibofarhe. 403-414 [doi]
- Sooner Lightweight Cryptosystem: Towards Privacy Preservation of Resource-Constrained DevicesAbraham Ayegba Alfa, John Kolo Alhassan, Olayemi Mikail Olaniyi, Morufu Olalere. 415-429 [doi]
- Comparative Performance Analysis of Anti-virus SoftwareNoel Moses Dogonyaro, Waziri Onomza Victor, Abdulhamid Muhammad Shafii, Salisu Lukman Obada. 430-443 [doi]
- An Efficient Lightweight Cryptographic Algorithm for IoT SecurityMuyideen Abdulraheem, Joseph Bamidele Awotunde, Rasheed Gbenga Jimoh, Idowu Dauda Oladipo. 444-456 [doi]
- Analysis and Classification of Some Selected Media Apps VulnerabilityOlawale Surajudeen Adebayo, Joel Sokoyebom Anyam, Shefiu Ganiyu, Sule Ajiboye Salawu. 457-469 [doi]
- Appraisal of Electronic Banking Acceptance in Nigeria Amidst Cyber Attacks Using Unified Theory of Acceptance and Use of TechnologyAli Usman Abdullahi, Stephany Adamu, Ali Muhammad Usman, Munir Adewoye, Mustapha Abubakar Yusuf, Enem Theophlus Aniemeka, Haruna Chiroma. 470-481 [doi]
- A Scoping Review of the Literature on the Current Mental Health Status of DevelopersGhaida Albakri, Rahma Bouaziz. 485-496 [doi]
- Gamifying Users' Learning Experience of ScrumGuillermo Rodríguez 0002, Alfredo Teyseyre, Pablo Gonzalez, Sanjay Misra. 497-509 [doi]
- Visualizing Multilevel Test-to-Code RelationsNadera Aljawabrah, Abdallah Qusef, Tamás Gergely, Adhyatmananda Pati. 510-519 [doi]
- Privacy Preservation in Mobile-Based Learning Systems: Current Trends, Methodologies, Challenges, Opportunities and Future DirectionMuhammad Kudu Muhammad, Ishaq Oyebisi Oyefolahan, Olayemi Mikail Olaniyi, Ojeniyi Joseph Adebayo. 520-534 [doi]
- Drug Verification System Using Quick Response CodeRoseline Oluwaseun Ogundokun, Joseph Bamidele Awotunde, Sanjay Misra, Dennison Oluwatobi Umoru. 535-545 [doi]
- A Novel Approach to News Archiving from NewswiresBilkisu Larai Muhammad-Bello, Mudi Lukman, Mudi Salim. 546-559 [doi]
- Mobile Application Software Usability Evaluation: Issues, Methods and Future Research DirectionsBlessing Iganya Attah, John Kolo Alhassan, Ishaq Oyebisi Oyefolahan, Sulaimon Adebayo Bashir. 560-573 [doi]
- Perception of Social Media Privacy Among Computer Science StudentsAdebayo Omotosho, Peace Ayegba, Justice Emuoyibofarhe. 574-587 [doi]
- An Efficient Holistic Schema Matching ApproachAola Yousfi, Moulay Hafid El Yazidi, Ahmed Zellou. 588-601 [doi]
- AnnoGram4MD: A Language for Annotating Grammars for High Quality Metamodel DerivationHamzat Olanrewaju Aliyu, Oumar Maïga. 602-617 [doi]
- Design and Implementation of an IoT Based Baggage Tracking SystemOlamilekan Shobayo, Ayobami Olajube, Obina Okoyeigbo, Jesse Ogbonna. 618-631 [doi]
- Validation of Computational-Rabi's Driver Training Model for Prime Decision-MakingRabi Mustapha, Muhammed Auwal Ahmed, Muhammad Aminu Ahmad. 632-644 [doi]
- Efficient Approaches to Agile Cost Estimation in Software Industries: A Project-Based Case StudyShariq Aziz Butt, Sanjay Misra, Jorge Luis Díaz Martinez, Emiro de la Hoz Franco. 645-659 [doi]
- Efficient Traffic Control System Using Fuzzy Logic with PriorityAyuba Peter, Babangida Zachariah, Luhutyit Peter Damuut, Sa'adatu Abdulkadir. 660-674 [doi]
- An Enhanced WordNet Query Expansion Approach for Ontology Based Information Retrieval SystemEnesi Femi Aminu, Ishaq Oyebisi Oyefolahan, Muhammad Bashir Abdullahi, Muhammadu Tajudeen Salaudeen. 675-688 [doi]
- Design of a Robotic Wearable Shoes for Locomotion Assistance SystemBala Alhaji Salihu, Lukman Adewale Ajao, Sanusi Adeiza Audu, Blessing Olatunde Abisoye. 689-702 [doi]
- Design of Cash Advance Payment System in a Developing Country: A Case Study of First Bank of Nigeria Mortgages LimitedSaka John, Jacob O. Mebawondu, Ajayi O. Olajide, Mebawondu O. Josephine. 703-714 [doi]
- Users' Perception of the Telecommunication Technologies Used for Improving Service Delivery at Federal University Libraries in Anambra and Enugu StateRebecca Chidimma Ojobor. 715-726 [doi]
- A Step by Step Guide for Choosing Project Topics and Writing Research Papers in ICT Related DisciplinesSanjay Misra. 727-744 [doi]