Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 96
    
    
    
| Issue Date | Title | Author(s) | 
| 2025-02-27 | REVIEW OF DATA-DRIVEN AND MODEL-BASED PIPELINE MONITORING AND LEAKAGE DETECTION TECHNIQUES | Adamu, Abubakar; Opeyemi, Aderiike Abisoye; Alabi, Isiaq Oludare; Adepoju, Solomon; Oyefolahan, Ishaq Oyebisi | 
| 2024-07-19 | Utilizing Metaheuristic Ensemble Feature Selection to Enhance Intrusion Detection Systems | Shuaibu, Y. B.; Alabi, I. O. | 
| 2024-08-15 | A NOVEL DEEP BELIEF-BASED MODEL FOR THE INTRUSION DETECTION OF NETWORK TRAFFIC | Sule, Aishat A.; Alhassan, John K.; Ismaila, I.; Alabi, I. O.; Subairu, S. O. | 
| 2024-07 | Anti-Spoofing Detection Model Using Transfer Learning Techniques for Smart Door Security Systems | Hussaini, Shamsudeen; Alabi, Isiaq Oludare; Ojerinde, Oluwaseun Adeniyi | 
| 2017-12-04 | Framework for a Semantic Data Transformation in Solving Data Quality Issues in Big Data | Onyeabor, Grace; Ta'a, Azman | 
| 2019-07-23 | A Model for Addressing Quality Issues in Big Data | Onyeabor, Grace; Ta'a, Azman | 
| 2023-11 | Microcontroller Home-Based Security Reporting System using GPS-enabled Technology | Ikwuazom, Callistus; Onyeabor, Grace; Uche, Timothy; Atiku, Mustapha; Muhammad-Bello, Bilkisu; Anunuso, Justice | 
| 2022 | DIABETES RETINOPATHY SEVERITY GRADING USING MULTI- SCALE IMAGE PYRAMID TECHNIQUES | Muhammad, J. G. Yunusa; Aliyu, Hamzat Olanrewaju; Sulaimon, A. Bashir; Mohammed, Danlami Abdulmalik | 
| 2022 | MACHINE LEARNING MODELS FOR RISK MANAGEMENT IN NIGERIAN CUSTOMS: AN INVESTIGATIVE PERFORMANCE ANALYSIS | Nusa, Aisha M. K.; Alhassan, John Kolo; Aliyu, Hamzat Olanrewaju; Abdullahi, I. M | 
| 2022-02 | REGISTRATION AND VERIFICATION OF BIRTH CERTIFICATE USING BLOCKCHAIN TECHNOLOGY | BENNETT, CHIMDINMA UCHE; OJERINDE, OLUWASEUN ADENIYI; ALIYU, HAMZAT OLANREWAJU; ADEPOJU, ADELOWO SOLOMON | 
| 2022-03 | Effect of Temperature Compensator in Thermal Efficiency Management in Data Centre | C.T. IKwazom, D.O Njoku; E.C Nwokorie, I.A. Aaefule; O.C Nwokonkwo, J.E Jibiri; T.C Okeahialam, F.U Madu | 
| 2022-03 | Effect of Temperature Compensator in Thermal Efficiency Management in Data Centre | C.T. IKwazom, D.O Njoku; E.C Nwokorie, I.A. Aaefule; O.C Nwokonkwo, J.E Jibiri; T.C Okeahialam, F.U Madu | 
| 2015 | Digital Forensic Analysis for Enhancing Information Security | Ojeniyi, Sulaiman I.; Ade, Ganiyu, S.O. A.Y.; Alabi, I.O. | 
| 2016 | Detecting Fraud Transactions Using Radial Basis Function-Artificial Neural Network | Alabi, Jimoh, R.G. I.O. | 
| 2015 | Enhanced information hiding using symmetric encryption technique and least significant bits steganographic design approach | Adebayo, Bolaji, A. A.; Suleiman, Ganiyu, S.O. I.; Alabi, I.O. | 
| 2009 | Towards Understanding Software Engineering Ethical Frameworks Supporting Professional Bodies Ethical Principle | Oriogun, Peter; Babakano, Faiza; Chiejina, Peter; Chiroma, Fatima; Khanoba, Malachy | 
| 2016-09-27 | Students’ Academic Performance Modelling and Prediction: A Fuzzy-Based Approach. | Etuk, Stella; Oyefolahan, Ishaq; Zubairu, Abubakar Hussein; Babakano, Faiza | 
| 2015 | Performance Metrics for Image Segmentation Techniques: A Review | Babakano, Faiza Jada; Aibinu, Musa Abiodun; Onumanyi, Adeiza James | 
| 2016 | ICT Based Framework for Solid Waste Collection, Transfer and Disposal | Babakano, Faiza Jada; Oyefolahan, Ishaq; Zubairu, Abubakar Hussein; Etuk, Stella | 
| 2014-04 | ALLIGNING ICT STRUCTURES WITH NATIONAL SECURITY POLICY | Alabi, I.O.; Ganiyu, S.O.; Adesuyi, F.A.; Muhammad-Bello, B. | 
    
    
        Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 96