关注
Justice Aning
Justice Aning
Sunyani Technical University
在 stu.edu.gh 的电子邮件经过验证
标题
引用次数
引用次数
年份
Performance of machine learning algorithms with different K values in K-fold CrossValidation
IK Nti, O Nyarko-Boateng, J Aning
International Journal of Information Technology and Computer Science 13 (6 …, 2021
1092021
A mini-review of machine learning in big data analytics: Applications, challenges, and prospects
IK Nti, JA Quarcoo, J Aning, GK Fosu
Big Data Mining and Analytics 5 (2), 81-97, 2022
992022
Academic performance modelling with machine learning based on cognitive and non-cognitive features
B Owusu-Boadu, IK Nti, O Nyarko-Boateng, J Aning, V Boafo
Applied Computer Systems 26 (2), 122-131, 2021
102021
A mini-review of machine learning in big data analytics: Applications, challenges, and prospects. Big Data Mining and Analytics, 5 (2), 81-97
IK Nti, JA Quarcoo, J Aning, GK Fosu
52021
Early Detection of Stroke for Ensuring Health and Well-Being Based on Categorical Gradient Boosting Machine.
IK Nti, O Nyarko-Boateng, J Aning, GK Fosu, HA Pokuaa, F Kyeremeh
Journal of ICT Research & Applications 16 (3), 2022
42022
A fraud prevention and secure cognitive SIM card registration model
ON Boateng, B Nkrumah, V Boafo, A Amponsah, LA Tetteh, J Aning, ...
Indian Journal of Science and Technology 15 (46), 2562-2569, 2022
32022
A Comparative Empirical Analysis of 21 Machine Learning Algorithms for Real-World Applications in Diverse Domains
IK Nti, J Aning, BBK Ayawli, K Frimpong, AY Appiah, O Nyarko-Boateng
32021
Predicting the Remaining Lifetime of Distribution Transformers using Machine Learning
PGGJA Ntiminity Abontakoyah Enoch1
American Journal of Engineering and Applied Sciences 13 (4), 627-638, 2021
3*2021
Relevance Of E-Library Facility to the Delivery of Education at the High School: An Example From Ghana
AK Justice Anning Owusu Nyarko-Boateng
International Journal of Scientific & Engineering Research 8 (Issue 5), 910-918, 2017
3*2017
Using LSB steganography technique and 256 bits key length AES algorithm for high secured information hiding
E Gyamfi, IK Nti, J Aning
International Journal 7 (5), 2017
22017
Policy Compliance Standards for Underground Fiber Cable Deployment and Post-Deployment Protection
O Nyarko-Boateng, AF Adekoya, BA Weyori, J Ening, IK Nti
Indian Journal of Science and Technology 14 (25), 2088-2094, 2021
12021
系统目前无法执行此操作,请稍后再试。
文章 1–11