Olusegun Folorunso

Orcid: 0000-0002-9897-7375

According to our database1, Olusegun Folorunso authored at least 33 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Optimized ensemble machine learning model for software bugs prediction.
Innov. Syst. Softw. Eng., March, 2023

Exploring Machine Learning Models for Soil Nutrient Properties Prediction: A Systematic Review.
Big Data Cogn. Comput., 2023

2021
A probabilistic clustering model for hate speech classification in twitter.
Expert Syst. Appl., 2021

Adaptive Neuro-Fuzzy Model for Vehicle Theft Prediction and Recovery.
Proceedings of the Informatics and Intelligent Applications, 2021

2020
Hate speech detection in Twitter using hybrid embeddings and improved cuckoo search-based neural networks.
Int. J. Intell. Comput. Cybern., 2020

Machine learning techniques for hate speech classification of twitter data: State-of-the-art, future challenges and research directions.
Comput. Sci. Rev., 2020

2019
CA-KSE: a combinatorial algorithm for benchmarking in knowledge sharing environment.
Int. J. Intell. Comput. Cybern., 2019

2018
A Bayesian Based System for Evaluating Customer Satisfaction in an Online Store.
Proceedings of the Intelligent Systems and Applications, 2018

2017
A probabilistic approach to event log completeness.
Expert Syst. Appl., 2017

2015
Knowledge Sharing Trust Level Measurement Adoption Model Based On Fuzzy Expert System.
Comput. Inf. Sci., 2015

2014
A Predictive Stock Market Technical Analysis Using Fuzzy Logic.
Comput. Inf. Sci., 2014

2012
Towards Active Citizen-Centric E-Government Systems for Developing Countries.
Int. J. E Adopt., 2012

An Exploratory Study of Critical Factors Affecting the Efficiency of Sorting Techniques (Shell, Heap and Treap)
CoRR, 2012

2011
An Improved Semi-Global Alignment Algorithm for Masquerade Detection.
Int. J. Netw. Secur., 2011

Preventing Social Engineering and Espionage in Collaborative Knowledge Management Systems (KMSs).
Int. J. E Adopt., 2011

An Improved Dynavote E-Voting Protocol Implementation.
Int. J. E Adopt., 2011

TCP Window Based Congestion Control -Slow-Start Approach.
Commun. Netw., 2011

Visualizing and Assessing a Compositional Approach to Service-Oriented Business Process Design Using Unified Modelling Language (UML).
Comput. Inf. Sci., 2011

Service Oriented Application in Agent Based Virtual Knowledge Community.
Comput. Inf. Sci., 2011

Pinch Analysis as a Knowledge Management Tool for Optimization in Supply Chain.
Comput. Inf. Sci., 2011

2010
Knowledge Sharing Adoption Model Based on Artificial Neural Networks.
Int. J. E Adopt., 2010

Improving e-payment security using Elliptic Curve Cryptosystem.
Electron. Commer. Res., 2010

ID-SOMGA: A Self Organising Migrating Genetic Algorithm-Based Solution for Intrusion Detection.
Comput. Inf. Sci., 2010

Using Visual Analytics to Develop Situation Awareness in Network Intrusion Detection System.
Comput. Inf. Sci., 2010

2009
A conceptual analysis and design of a management system for "Ifa" (an African traditional oracle).
Kybernetes, 2009

On consolidation model in e-bill presentment and payment.
Inf. Manag. Comput. Secur., 2009

Fuzzy-Rule-Based Approach for Modeling Sensory Acceptabitity of Food Products.
Data Sci. J., 2009

2008
Challenges in the adoption of visualization system: a survey.
Kybernetes, 2008

Applying an Enhanced Technology Acceptance Model to Knowledge Management in Agricultural Extension Services.
Data Sci. J., 2008

Visualizing Concurrency Control Algorithms for Real-Time Database Systems.
Data Sci. J., 2008

2007
Image edge detection: A knowledge management technique for visual scene analysis.
Inf. Manag. Comput. Secur., 2007

2006
An exploratory study of the critical factors affecting the acceptability of e-learning in Nigerian universities.
Inf. Manag. Comput. Secur., 2006

2005
Data mining as a technique for knowledge management in business process redesign.
Inf. Manag. Comput. Security, 2005


  Loading...