Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 96
Issue Date | Title | Author(s) |
2025-02-27 | REVIEW OF DATA-DRIVEN AND MODEL-BASED PIPELINE MONITORING AND LEAKAGE DETECTION TECHNIQUES | Adamu, Abubakar; Opeyemi, Aderiike Abisoye; Alabi, Isiaq Oludare; Adepoju, Solomon; Oyefolahan, Ishaq Oyebisi |
2024-07-19 | Utilizing Metaheuristic Ensemble Feature Selection to Enhance Intrusion Detection Systems | Shuaibu, Y. B.; Alabi, I. O. |
2024-08-15 | A NOVEL DEEP BELIEF-BASED MODEL FOR THE INTRUSION DETECTION OF NETWORK TRAFFIC | Sule, Aishat A.; Alhassan, John K.; Ismaila, I.; Alabi, I. O.; Subairu, S. O. |
2024-07 | Anti-Spoofing Detection Model Using Transfer Learning Techniques for Smart Door Security Systems | Hussaini, Shamsudeen; Alabi, Isiaq Oludare; Ojerinde, Oluwaseun Adeniyi |
2017-12-04 | Framework for a Semantic Data Transformation in Solving Data Quality Issues in Big Data | Onyeabor, Grace; Ta'a, Azman |
2019-07-23 | A Model for Addressing Quality Issues in Big Data | Onyeabor, Grace; Ta'a, Azman |
2023-11 | Microcontroller Home-Based Security Reporting System using GPS-enabled Technology | Ikwuazom, Callistus; Onyeabor, Grace; Uche, Timothy; Atiku, Mustapha; Muhammad-Bello, Bilkisu; Anunuso, Justice |
2022 | DIABETES RETINOPATHY SEVERITY GRADING USING MULTI- SCALE IMAGE PYRAMID TECHNIQUES | Muhammad, J. G. Yunusa; Aliyu, Hamzat Olanrewaju; Sulaimon, A. Bashir; Mohammed, Danlami Abdulmalik |
2022 | MACHINE LEARNING MODELS FOR RISK MANAGEMENT IN NIGERIAN CUSTOMS: AN INVESTIGATIVE PERFORMANCE ANALYSIS | Nusa, Aisha M. K.; Alhassan, John Kolo; Aliyu, Hamzat Olanrewaju; Abdullahi, I. M |
2022-02 | REGISTRATION AND VERIFICATION OF BIRTH CERTIFICATE USING BLOCKCHAIN TECHNOLOGY | BENNETT, CHIMDINMA UCHE; OJERINDE, OLUWASEUN ADENIYI; ALIYU, HAMZAT OLANREWAJU; ADEPOJU, ADELOWO SOLOMON |
2022-03 | Effect of Temperature Compensator in Thermal Efficiency Management in Data Centre | C.T. IKwazom, D.O Njoku; E.C Nwokorie, I.A. Aaefule; O.C Nwokonkwo, J.E Jibiri; T.C Okeahialam, F.U Madu |
2022-03 | Effect of Temperature Compensator in Thermal Efficiency Management in Data Centre | C.T. IKwazom, D.O Njoku; E.C Nwokorie, I.A. Aaefule; O.C Nwokonkwo, J.E Jibiri; T.C Okeahialam, F.U Madu |
2015 | Digital Forensic Analysis for Enhancing Information Security | Ojeniyi, Sulaiman I.; Ade, Ganiyu, S.O. A.Y.; Alabi, I.O. |
2016 | Detecting Fraud Transactions Using Radial Basis Function-Artificial Neural Network | Alabi, Jimoh, R.G. I.O. |
2015 | Enhanced information hiding using symmetric encryption technique and least significant bits steganographic design approach | Adebayo, Bolaji, A. A.; Suleiman, Ganiyu, S.O. I.; Alabi, I.O. |
2009 | Towards Understanding Software Engineering Ethical Frameworks Supporting Professional Bodies Ethical Principle | Oriogun, Peter; Babakano, Faiza; Chiejina, Peter; Chiroma, Fatima; Khanoba, Malachy |
2016-09-27 | Students’ Academic Performance Modelling and Prediction: A Fuzzy-Based Approach. | Etuk, Stella; Oyefolahan, Ishaq; Zubairu, Abubakar Hussein; Babakano, Faiza |
2015 | Performance Metrics for Image Segmentation Techniques: A Review | Babakano, Faiza Jada; Aibinu, Musa Abiodun; Onumanyi, Adeiza James |
2016 | ICT Based Framework for Solid Waste Collection, Transfer and Disposal | Babakano, Faiza Jada; Oyefolahan, Ishaq; Zubairu, Abubakar Hussein; Etuk, Stella |
2014-04 | ALLIGNING ICT STRUCTURES WITH NATIONAL SECURITY POLICY | Alabi, I.O.; Ganiyu, S.O.; Adesuyi, F.A.; Muhammad-Bello, B. |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 96