{"id":1271,"date":"2022-07-26T08:05:24","date_gmt":"2022-07-26T08:05:24","guid":{"rendered":"https:\/\/localhost\/conims\/?page_id=1271"},"modified":"2022-08-28T17:06:53","modified_gmt":"2022-08-28T17:06:53","slug":"conference-proceedings","status":"publish","type":"page","link":"https:\/\/conims.unilag.edu.ng\/?page_id=1271","title":{"rendered":"CONFERENCE PROCEEDINGS"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1271\" class=\"elementor elementor-1271\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dba0378 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dba0378\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d3440fa\" data-id=\"d3440fa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dde480f elementor-widget elementor-widget-image\" data-id=\"dde480f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"348\" height=\"331\" src=\"https:\/\/conims.unilag.edu.ng\/wp-content\/uploads\/2022\/08\/2021-CoNIMS-Conference-e1661019929127.png\" class=\"attachment-large size-large wp-image-1684\" alt=\"\" srcset=\"https:\/\/conims.unilag.edu.ng\/wp-content\/uploads\/2022\/08\/2021-CoNIMS-Conference-e1661019929127.png 348w, https:\/\/conims.unilag.edu.ng\/wp-content\/uploads\/2022\/08\/2021-CoNIMS-Conference-e1661019929127-300x285.png 300w, https:\/\/conims.unilag.edu.ng\/wp-content\/uploads\/2022\/08\/2021-CoNIMS-Conference-e1661019929127-153x146.png 153w, https:\/\/conims.unilag.edu.ng\/wp-content\/uploads\/2022\/08\/2021-CoNIMS-Conference-e1661019929127-50x48.png 50w, https:\/\/conims.unilag.edu.ng\/wp-content\/uploads\/2022\/08\/2021-CoNIMS-Conference-e1661019929127-79x75.png 79w\" sizes=\"(max-width: 348px) 100vw, 348px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f0b892 elementor-widget elementor-widget-button\" data-id=\"1f0b892\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/localhost\/conims\/wp-content\/uploads\/2022\/08\/2021-CoNIMS-Conference-Proceedings.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">2021 Conference Proceeding download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c12ed79\" data-id=\"c12ed79\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2c69079 elementor-widget elementor-widget-text-editor\" data-id=\"2c69079\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>2021 Conference Paper Title<\/p><ol><li>TECHNOLOGY PERSPECTIVE OF BEHAVIORAL ATTRIBUTES ON E-COMMERCE SITES DURING PANDEMIC<\/li><li>SUPERVISED MACHINE LEARNING APROACHES FOR SENTIMENT ANALYSIS ON A MOVIE REVIEW<\/li><li>CLOUD COMPUTING LOAD BALANCING: RETROSPECTS AND CHALLENGES<\/li><li>FRIEND RECOMMENDER SYSTEM BASED ON PERSONALITY TRAITS USING REGRESSION TREE ALGORITHM<\/li><li>A SYSTEMATIC REVIEW ON TECHNIQUES FOR CREDIT CARD FRAUD DETECTION<\/li><li>SECURE DECENTRALIZED HEALTH RECORD STORAGE AND SHARING SYSTEM BASED ON BLOCKCHAIN AND IPFS<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c0803eb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c0803eb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9f6b2ba\" data-id=\"9f6b2ba\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e8f84f6 elementor-widget elementor-widget-image\" data-id=\"e8f84f6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"325\" height=\"386\" src=\"https:\/\/conims.unilag.edu.ng\/wp-content\/uploads\/2022\/08\/2019-CoNIMS-Conference.png\" class=\"attachment-large size-large wp-image-1709\" alt=\"\" srcset=\"https:\/\/conims.unilag.edu.ng\/wp-content\/uploads\/2022\/08\/2019-CoNIMS-Conference.png 325w, https:\/\/conims.unilag.edu.ng\/wp-content\/uploads\/2022\/08\/2019-CoNIMS-Conference-253x300.png 253w, https:\/\/conims.unilag.edu.ng\/wp-content\/uploads\/2022\/08\/2019-CoNIMS-Conference-123x146.png 123w, https:\/\/conims.unilag.edu.ng\/wp-content\/uploads\/2022\/08\/2019-CoNIMS-Conference-42x50.png 42w, https:\/\/conims.unilag.edu.ng\/wp-content\/uploads\/2022\/08\/2019-CoNIMS-Conference-63x75.png 63w\" sizes=\"(max-width: 325px) 100vw, 325px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fae8f71 elementor-widget elementor-widget-button\" data-id=\"fae8f71\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/localhost\/conims\/wp-content\/uploads\/2022\/08\/2019-CoNIMS-Conference-Proceedings.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">2019 Conference Proceeding download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8478c5e\" data-id=\"8478c5e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eb91310 elementor-widget elementor-widget-text-editor\" data-id=\"eb91310\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>2019 Conference Paper Title<\/p><ol><li>Big Data And Big Data Analytics: A Literature-Based Research On Privacy And Security \u2013 A Decade Tour<em>\u00a0<\/em><\/li><\/ol><ol start=\"2\"><li>Development of a Framework for the Determination of an Asset as Critical National Information Infrastructure (CNII)<\/li><\/ol><ol start=\"3\"><li>Electronic Voting: a Framework for a Secure Biometric-Based System<em>\u00a0<\/em><\/li><\/ol><ol start=\"4\"><li>Towards Hybridization Of Genetic Algorithm (Ga) And Artificial Neural Network (Ann) For The Detection Of Advanced Persistent Threats (APT)<em>\u00a0<\/em><\/li><\/ol><ol start=\"5\"><li>A Digital Forensics Investigation Model that Incorporates Digital Chain of Custody for its Integrity, and Authenticity<em>\u00a0<\/em><\/li><\/ol><ol start=\"6\"><li>Design and Implementation of an Internet-Driven Indoor Fire Alarm System using Internet of Things Circuitry (Arduino)<em>\u00a0<\/em><\/li><\/ol><ol start=\"7\"><li>A Framework for Performance Evaluation of Email Spam Detection<em>\u00a0<\/em><\/li><\/ol><ol start=\"8\"><li>Email Urgency Classifier Using Natural Language Processing and Na\u00efve Bayes<em>\u00a0<\/em><\/li><\/ol><ol start=\"9\"><li>Securing the Chain Of Drug Distribution Analysis Using The Blockchain Technology<em>\u00a0<\/em><\/li><\/ol><ol start=\"10\"><li>On Quantum Cryptography for Network Security<em>\u00a0<\/em><\/li><\/ol><ol start=\"11\"><li>A Convolutional Neural Network Library<\/li><li>Issues And Challenges Using Wi-Fi In Internet Of Things (IoT) Smart City<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-040fb30 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"040fb30\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2b6dda0\" data-id=\"2b6dda0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f9166ba elementor-widget elementor-widget-image\" data-id=\"f9166ba\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"413\" height=\"306\" src=\"https:\/\/conims.unilag.edu.ng\/wp-content\/uploads\/2022\/08\/2018-CoNIMS-Conference.png\" class=\"attachment-large size-large wp-image-1732\" alt=\"\" srcset=\"https:\/\/conims.unilag.edu.ng\/wp-content\/uploads\/2022\/08\/2018-CoNIMS-Conference.png 413w, https:\/\/conims.unilag.edu.ng\/wp-content\/uploads\/2022\/08\/2018-CoNIMS-Conference-300x222.png 300w, https:\/\/conims.unilag.edu.ng\/wp-content\/uploads\/2022\/08\/2018-CoNIMS-Conference-197x146.png 197w, https:\/\/conims.unilag.edu.ng\/wp-content\/uploads\/2022\/08\/2018-CoNIMS-Conference-50x37.png 50w, https:\/\/conims.unilag.edu.ng\/wp-content\/uploads\/2022\/08\/2018-CoNIMS-Conference-101x75.png 101w\" sizes=\"(max-width: 413px) 100vw, 413px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c07c31 elementor-widget elementor-widget-button\" data-id=\"5c07c31\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/localhost\/conims\/wp-content\/uploads\/2022\/08\/2018-CoNIMS-Conference-Proceedings.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">2018 Conference Proceeding download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2c77071\" data-id=\"2c77071\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f7c2350 elementor-widget elementor-widget-text-editor\" data-id=\"f7c2350\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>2018 Conference Paper Title<\/p><ol><li>A Deep Learning Model for Predicting Multistage Cyberattacks<\/li><li>Real-Time Mobile Health System for Remote Consultations<\/li><li>Deep Neural Network-Based Learning Analytics in Medical Education for Enhanced Universal Health Coverage<\/li><li>Dual Biometrics And Elliptic Curve Cryptography Based E-Commerce Security<\/li><li>Implementation of Modified Pull-All Data Migration for a Java-based Mobile Agent Using Coloured Petri Net (CPN)<\/li><li>Detection of a Real-time Cyber-attack using Locator Agent Algorithm<\/li><li>Performance Analysis-Based Parameter Tuning Of Clonal Selection Algorithm For Anomaly Detection<\/li><li>Digital Security Considerations For Development: Wearables Personal Emergency Response Systems (WPERS) For Safety, Security, and Health<\/li><li>Normative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network<\/li><li>Design and Implementation of a Knowledge-Based Authentication System<\/li><li>Web-based Employee Management System for Nigerian Institute of Medical Research<\/li><li>Password Authentication and Staff Awareness Training: Towards Security of Enterprise Users<\/li><li>Survey of Intellectual Capital Models, Strengths and Weaknesses<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-39d5cde elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"39d5cde\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-28cc258\" data-id=\"28cc258\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-16f3e00\" data-id=\"16f3e00\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>2021 Conference Proceeding download 2021 Conference Paper Title TECHNOLOGY PERSPECTIVE OF BEHAVIORAL ATTRIBUTES ON E-COMMERCE SITES DURING PANDEMIC SUPERVISED MACHINE LEARNING APROACHES FOR SENTIMENT ANALYSIS ON<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1271","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/conims.unilag.edu.ng\/index.php?rest_route=\/wp\/v2\/pages\/1271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conims.unilag.edu.ng\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/conims.unilag.edu.ng\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/conims.unilag.edu.ng\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/conims.unilag.edu.ng\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1271"}],"version-history":[{"count":100,"href":"https:\/\/conims.unilag.edu.ng\/index.php?rest_route=\/wp\/v2\/pages\/1271\/revisions"}],"predecessor-version":[{"id":2027,"href":"https:\/\/conims.unilag.edu.ng\/index.php?rest_route=\/wp\/v2\/pages\/1271\/revisions\/2027"}],"wp:attachment":[{"href":"https:\/\/conims.unilag.edu.ng\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}