Collection's Items (Sorted by Submit Date in Descending order): 241 to 260 of 264
| Issue Date | Title | Author(s) |
| 2017 | Classification of Crime Data for Crime Control Using C4.5 and Naïve Bayes Techniques | Obuandike, Georgina N.; Alhassan, J. K.; Abdullahi, M. B |
| 2017-05 | A Proposed Model for Dynamic Graphical Password Integration into ATM Authentication | Subairu, S. O.; Alhassan, J. K.; Waziri, V. O |
| 2016-11 | Evaluating Capabilities of Rootkits Tools. | Alhassan, J. K.; Subairu, S. O; Misra, S |
| 2016 | A Critical Analysis of Component-Based Software Engineering | Subairu, Sikiru Olanrewaju; Alhassan, J. K. |
| 2015-10 | A Decision Tree Approach for Predicting Students Academic Performance | Kolo, David Kolo; Adepoju, Solomon A.; Alhassan, J. K. |
| 2007 | An Evaluation of Internet Connectivity of Information Technology Firms in Minna Metropolis | Alhassan, J. K.; Adepoju, S. A. |
| 2015-12 | Analytical Study of Some Selected Classification Algorithms in WEKA Using Real Crime Data | Obuandike, Georgina N.,; Audu, Isah; Alhassan, J. K. |
| 2015-09 | Performance Analysis of Artificial Neural Network with Decision Tree in Prediction of Diabetes Mellitus | Alhassan, J. K.; Attah, B; Misra, S |
| 2015-07 | Using Data Mining Technique for Scholarship Disbursement | Alhassan, J. K.; Lawal, S. A. |
| 2015-05 | Factors Militating against Successful Implementation of Computer Studies in 9-Year Universal Basic Education (UBE) Programme | Suleiman, Garba; Adepoju, Solomon A.; Alhassan, J. K. |
| 2015-05 | Review of Software Reliability Analysis Models: A Case Study of Operating Systems | Abdullahi, Muhammed B; Alhassan, J. K.; Adepoju, Solomon; Adamu, Abubakar |
| 2015 | Plastic Financial Fraud in the Most Populated Black Africa; Nigeria: The Mitigation Based-On One-Time Password | Waziri, Victor Onomza; Alhassan, J. K.; Ismaila, Idris; Tunde, Abdulrahman |
| 2015-03 | The Application of Hybrid Cryptographic Algorithms for Cyber Warfare and Terrorism in a Nation Defence | Waziri, Victor Onomza; Alhassan, J. K.; Ismaila, Idris |
| 2015-04 | Web-based Security Services based-on Elliptic Curves Cryptosystem | Waziri, Victor Onomza; Alhassan, J. K.; Danladi, Hakimi |
| 2015 | Development of Secure Antivirus with the Artificial Immune System Model | Waziri, Victor Onomza; Alhassan, J. K.; Olalere, Morufu; Abdulkadir, Adamu |
| 2014-12 | Big Data Analytics and the Epitome of fully Homomorphic Encryption Scheme for Cloud Computing Security | Waziri, Victor O.; Alhassan, J. K.; Olalere, Morufu; Ismaila, Idris |
| 2015-03 | Comparative Study of Inflation Rates Forecasting Using Feed-Forward Artificial Neural Networks and Auto Regressive (AR) Models | Onimude, Bayo Mohammed; Alhassan, J. K.; Adepoju, Solomon A. |
| 2015-01 | Effective Networking Model for Efficient Implementation of E-Governance: A Case Study of Nigeria | Osho, Lauretta O; Abdullahi, Muhammad B; Osho, Oluwafemi; Alhassan, J. K. |
| 2015 | On the Use of Decision Tree for Treatment Options in Medical Decision | Mamman, Joseph Ndagatsa; Abdullahi, Muhammad Bashir; Alhassan, J. K.; Adepoju, Solomon A |
| 2008 | A Proposed Model for Distributed Database System on Academic Performance of Tertiary Institutions in Nigeria | Alhassan, J. K. |
Collection's Items (Sorted by Submit Date in Descending order): 241 to 260 of 264