关注
Christopher Ifeanyi Eke
Christopher Ifeanyi Eke
Lecturer, Federal University of Lafia, Nasarawa state Nigeria
在 fulafia.edu.ng 的电子邮件经过验证
标题
引用次数
引用次数
年份
A comprehensive survey of clustering algorithms: State-of-the-art machine learning applications, taxonomy, challenges, and future research prospects
AE Ezugwu, AM Ikotun, OO Oyelade, L Abualigah, JO Agushaka, CI Eke, ...
Engineering Applications of Artificial Intelligence 110, 104743, 2022
4932022
A Survey of User Profiling: State-of-the-Art, Challenges, and Solutions
C.I Eke, Azah A. N, Liyana S, H. F Nweke
IEE Access 7 (2), 144907-144924, 2019
1452019
Context-based feature technique for sarcasm identification in benchmark datasets using deep learning and BERT model
CI Eke, AA Norman, L Shuib
IEEE Access 9, 48501-48518, 2021
832021
Sarcasm identification in textual data: systematic review, research challenges and open directions
CI Eke, AA Norman, L Shuib, HF Nweke
Artificial Intelligence Review 53, 4215-4258, 2020
702020
Smart farming prediction models for precision agriculture: a comprehensive survey
DK Kwaghtyo, CI Eke
Artificial Intelligence Review 56 (6), 5729-5772, 2023
212023
The significance of global vectors representation in sarcasm analysis
CI Eke, A Norman, L Shuib, FB Fatokun, I Omame
2020 International Conference in Mathematics, Computer Engineering and …, 2020
172020
Deep learning techniques for solar tracking systems: A systematic literature review, research challenges, and open research directions
M Phiri, M Mulenga, A Zimba, CI Eke
Solar Energy 262, 111803, 2023
132023
Multi-feature fusion framework for sarcasm identification on twitter data: A machine learning based approach
CI Eke, AA Norman, L Shuib
Plos one 16 (6), e0252918, 2021
122021
Azah Anir Norman, Liyana Shuib, and Henry Friday Nweke. 2019
CI Eke
A survey of user profiling: State-of-the-art, challenges, and solutions …, 2019
122019
Machine learning approach for detecting and combating bring your own device (BYOD) security threats and attacks: a systematic mapping review
CI Eke, AA Norman, M Mulenga
Artificial Intelligence Review 56 (8), 8815-8858, 2023
102023
Relating factors of tertiary institution students’ cybersecurity behavior
BF Faith, S Hamid, A Norman, OF Johnson, CI Eke
2020 International Conference in Mathematics, Computer Engineering and …, 2020
102020
A survey on mobile learning for adult learners: State-of-the-art, taxonomy, and challenges
S Sabri, A Gani, E Yadegaridehkordi, CI Eke, L Shuib
IEEE Access 10, 83884-83897, 2022
92022
An intelligent gamification tool to boost young kids cybersecurity knowledge on fb messenger
BF Faith, ZA Long, S Hamid, OF Johnson, CI Eke, A Norman
2022 16th International Conference on Ubiquitous Information Management and …, 2022
92022
Socio-technical mitigation effort to combat cyber propaganda: A systematic literature mapping
AN Maseri, AA Norman, CI Eke, A Ahmad, NNA Molok
Ieee Access 8, 92929-92944, 2020
52020
Bring your own device (byod) security threats and mitigation mechanisms: Systematic mapping
CI Eke, AN Anir
2021 International Conference on Computer Science and Engineering (IC2SE) 1 …, 2021
42021
Gamifying cybersecurity knowledge to promote good cybersecurity behaviour
FB Fatokun, ZA Long, S Hamid, JO Fatokun, CI Eke, A Norman
Journal of Computing Technologies and Creative Content 7 (2), 25-34, 2022
32022
Use of Java RMI on Mobile Devices for Peer to Peer Computing
CI Eke, AE Ezugwu, HF Nweke, ME Aydin
22013
A comprehensive literature review on image captioning methods and metrics based on deep learning technique
AS Al-Shamayleh, O Adwan, MA Alsharaiah, AH Hussein, QM Kharma, ...
Multimedia Tools and Applications 83 (12), 34219-34268, 2024
12024
Machine Learning-based E-Learners’ Engagement Level Prediction using Benchmark Datasets
CI Eke
International Journal of Applied Information Systems (IJAIS) 12 (41), 2023
12023
Random forest-based classifier for automatic sarcasm classification on twitter data using multiple features
C Eke, AA Norman, L Shuib, ZA Long
Journal of Information Systems and Digital Technologies 4 (2), 2022
12022
系统目前无法执行此操作,请稍后再试。
文章 1–20