default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 56 matches
- 2021
- Sanjay Misra, Bilkisu Larai Muhammad-Bello:
Information and Communication Technology and Applications - Third International Conference, ICTA 2020, Minna, Nigeria, November 24-27, 2020, Revised Selected Papers. Communications in Computer and Information Science 1350, Springer 2021, ISBN 978-3-030-69142-4 [contents] - 2020
- Guillermo Rodríguez, Alfredo Teyseyre, Pablo Gonzalez, Sanjay Misra:
Gamifying Users' Learning Experience of Scrum. ICTA 2020: 497-509 - Ali Usman Abdullahi, Stephany Adamu, Ali Muhammad Usman, Munir Adewoye, Mustapha Abubakar Yusuf, Enem Theophlus Aniemeka, Haruna Chiroma:
Appraisal of Electronic Banking Acceptance in Nigeria Amidst Cyber Attacks Using Unified Theory of Acceptance and Use of Technology. ICTA 2020: 470-481 - Idris Abdulmumin, Bashir Shehu Galadanci, Abubakar Isa:
Enhanced Back-Translation for Low Resource Neural Machine Translation Using Self-training. ICTA 2020: 355-371 - Muyideen Abdulraheem, Joseph Bamidele Awotunde, Rasheed Gbenga Jimoh, Idowu Dauda Oladipo:
An Efficient Lightweight Cryptographic Algorithm for IoT Security. ICTA 2020: 444-456 - Olawale Surajudeen Adebayo, Joel Sokoyebom Anyam, Shefiu Olusegun Ganiyu, Sule Ajiboye Salawu:
Analysis and Classification of Some Selected Media Apps Vulnerability. ICTA 2020: 457-469 - Emmanuel Adetiba, Amarachi E. Opara, Oluwaseun T. Ajayi, Folashade O. Owolabi:
DeepFacematch: A Convolutional Neural Network Model for Contactless Attendance on e-SIWES Portal. ICTA 2020: 196-205 - Akshat Agrawal, Anurag Jain:
Emotion Recognition of Speech in Hindi Using Dimensionality Reduction and Machine Learning Techniques. ICTA 2020: 119-129 - Kayode Omotosho Alabi, Sulaiman Olaniyi Abdulsalam, Roseline Oluwaseun Ogundokun, Micheal Olaolu Arowolo:
Credit Risk Prediction in Commercial Bank Using Chi-Square with SVM-RBF. ICTA 2020: 158-169 - Ghaida Albakri, Rahma Bouaziz:
A Scoping Review of the Literature on the Current Mental Health Status of Developers. ICTA 2020: 485-496 - Abraham Ayegba Alfa, John Kolo Alhassan, Olayemi Mikail Olaniyi, Morufu Olalere:
Sooner Lightweight Cryptosystem: Towards Privacy Preservation of Resource-Constrained Devices. ICTA 2020: 415-429 - Hamzat Olanrewaju Aliyu, Oumar Y. Maïga:
AnnoGram4MD: A Language for Annotating Grammars for High Quality Metamodel Derivation. ICTA 2020: 602-617 - Nadera Aljawabrah, Abdallah Qusef, Tamás Gergely, Adhyatmananda Pati:
Visualizing Multilevel Test-to-Code Relations. ICTA 2020: 510-519 - Enesi Femi Aminu, Ishaq Oyebisi Oyefolahan, Muhammad Bashir Abdullahi, Muhammadu Tajudeen Salaudeen:
An Enhanced WordNet Query Expansion Approach for Ontology Based Information Retrieval System. ICTA 2020: 675-688 - Gyunka Benjamin Aruwa, Oluwakemi Christiana Abikoye, Adekeye S. Adekunle:
Anomaly Android Malware Detection: A Comparative Analysis of Six Classifiers. ICTA 2020: 145-157 - Blessing Iganya Attah, John Kolo Alhassan, Ishaq Oyebisi Oyefolahan, Sulaimon Adebayo Bashir:
Mobile Application Software Usability Evaluation: Issues, Methods and Future Research Directions. ICTA 2020: 560-573 - Joseph Bamidele Awotunde, Rasheed Gbenga Jimoh, Idowu Dauda Oladipo, Muyideen Abdulraheem:
Prediction of Malaria Fever Using Long-Short-Term Memory and Big Data. ICTA 2020: 41-53 - Adam Adenike Azeezat, Onashoga Sadiat Adebukola, Adebayo Abayomi-Alli, Omoyiola Bayo Olushola:
A Conceptual Hybrid Model of Deep Convolutional Neural Network (DCNN) and Long Short-Term Memory (LSTM) for Masquerade Attack Detection. ICTA 2020: 170-184 - Shariq Aziz Butt, Sanjay Misra, Jorge Luis Díaz Martinez, Emiro De la Hoz-Franco:
Efficient Approaches to Agile Cost Estimation in Software Industries: A Project-Based Case Study. ICTA 2020: 645-659 - Nwodo Benita Chikodili, Mohammed D. Abdulmalik, Opeyemi Aderiike Abisoye, Sulaimon Adebayo Bashir:
Outlier Detection in Multivariate Time Series Data Using a Fusion of K-Medoid, Standardized Euclidean Distance and Z-Score. ICTA 2020: 259-271 - Ojuh O. Divine, Isabona Joseph:
Application of Supervised Machine Learning Based on Gaussian Process Regression for Extrapolative Cell Availability Evaluation in Cellular Communication Systems. ICTA 2020: 130-144 - Noel Moses Dogonyaro, Victor Onomza Waziri, Abdulhamid Muhammad Shafii, Salisu Lukman Obada:
Comparative Performance Analysis of Anti-virus Software. ICTA 2020: 430-443 - Himanshu Gupta, Sanjay Misra, Lov Kumar, N. L. Bhanu Murthy:
An Empirical Study to Investigate Data Sampling Techniques for Improving Code-Smell Prediction Using Imbalanced Data. ICTA 2020: 220-233 - Usman Haruna, Umar Sunusi Maitalata, Murtala Mohammed, Jaafar Zubairu Maitama:
Hausa Intelligence Chatbot System. ICTA 2020: 206-219 - Saka John, Jacob O. Mebawondu, Olusola O. Ajayi, Mebawondu O. Josephine:
Design of Cash Advance Payment System in a Developing Country: A Case Study of First Bank of Nigeria Mortgages Limited. ICTA 2020: 703-714 - Isabona Joseph, Ojuh O. Divine:
A Gaussian Mixture Model with Firm Expectation-Maximization Algorithm for Effective Signal Power Coverage Estimation. ICTA 2020: 93-106 - Ogbuka Mary Kenneth, Sulaimon Adebayo Bashir, Opeyemi Aderiike Abisoye, Abdulmalik Danlami Mohammed:
Face Morphing Attack Detection in the Presence of Post-processed Image Sources Using Neighborhood Component Analysis and Decision Tree Classifier. ICTA 2020: 340-354 - Christopher Bahago Martins, Emmanuel Adewale Adedokun, Ime Umoh Jarlath, Muhammed Bashir Mu'azu:
Spoof Detection in a Zigbee Network Using Forge-Resistant Network Characteristics (RSSI and LQI). ICTA 2020: 328-339 - Rytis Maskeliunas, Andrius Lauraitis, Robertas Damasevicius, Sanjay Misra:
Multi-class Model MOV-OVR for Automatic Evaluation of Tremor Disorders in Huntington's Disease. ICTA 2020: 3-14 - Jacob O. Mebawondu:
Comparative Analyses of Machine Learning Paradigms for Operators' Voice Call Quality of Service. ICTA 2020: 66-79
skipping 26 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-24 13:05 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint