Adebayo Abayomi-Alli

Orcid: 0000-0002-3875-1606

According to our database1, Adebayo Abayomi-Alli authored at least 24 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An improved cloud-based business process compliance management system using a user-centered approach.
Int. J. Syst. Assur. Eng. Manag., November, 2024

Securing the perceptual layer of E-payment-based internet of things devices using elliptic curve cryptography over binary field.
J. Supercomput., October, 2024

FruitQ: a new dataset of multiple fruit images for freshness evaluation.
Multim. Tools Appl., January, 2024

2023
Analyzing the Public Opinion as a Guide for Renewable-Energy Status in Malaysia: A Case Study.
IEEE Trans. Engineering Management, 2023

A Systematic Literature Review on Human Ear Biometrics: Approaches, Algorithms, and Trend in the Last Decade.
Inf., 2023

2022
Large Dataset of Nigeria Covid-19 Tweets for Sentiment Analysis and Opinion Mining Tasks.
Dataset, August, 2022

Study of the Yahoo-Yahoo Hash-Tag Tweets Using Sentiment Analysis and Opinion Mining Algorithms.
Inf., 2022

Hybrid Model of Genetic Algorithms and Tabu Search Memory for Nurse Scheduling Systems.
Int. J. Serv. Sci. Manag. Eng. Technol., 2022

A deep learning method for automatic SMS spam classification: Performance of learning algorithms on indigenous dataset.
Concurr. Comput. Pract. Exp., 2022

2021
An Ontology-Based Information Extraction System for Organic Farming.
Int. J. Semantic Web Inf. Syst., 2021

A probabilistic clustering model for hate speech classification in twitter.
Expert Syst. Appl., 2021

Malignant skin melanoma detection using image augmentation by oversampling in nonlinear lower-dimensional embedding manifold.
Turkish J. Electr. Eng. Comput. Sci., 2021

2020
An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security.
SN Comput. Sci., 2020

Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection.
Inf. Secur. J. A Glob. Perspect., 2020

A survey and meta-analysis of application-layer distributed denial-of-service attack.
Int. J. Commun. Syst., 2020

Harnessing the Potentials of Mobile Phone for Adoption and Promotion of Organic Farming Practices in Nigeria.
Proceedings of the Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation, 2020

A Conceptual Hybrid Model of Deep Convolutional Neural Network (DCNN) and Long Short-Term Memory (LSTM) for Masquerade Attack Detection.
Proceedings of the Information and Communication Technology and Applications, 2020

A Hybrid Machine Learning Model for Predicting Customer Churn in the Telecommunication Industry.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2020

An Intelligent Marketspace Mobile Application for Marketing Organic Products.
Proceedings of the Responsible Design, Implementation and Use of Information and Communication Technology, 2020

BiLSTM with Data Augmentation using Interpolation Methods to Improve Early Detection of Parkinson Disease.
Proceedings of the 2020 Federated Conference on Computer Science and Information Systems, 2020

2019
A review of soft techniques for SMS spam classification: Methods, approaches and applications.
Eng. Appl. Artif. Intell., 2019

Long Short-Term Memory Model for Time Series Prediction and Forecast of Solar Radiation and other Weather Parameters.
Proceedings of the 19th International Conference on Computational Science and Its Applications, 2019

Multi-class Classification of Impulse and Non-impulse Sounds Using Deep Convolutional Neural Network (DCNN).
Proceedings of the Computational Science and Its Applications - ICCSA 2019, 2019

2013
An Investigation of the Incidences of Repetitive Strain Injury among computer Users in Nigeria.
CoRR, 2013


  Loading...