Computer Science : [264] Collection home page

Computer Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 241 to 260 of 264
Issue DateTitleAuthor(s)
2017Classification of Crime Data for Crime Control Using C4.5 and Naïve Bayes TechniquesObuandike, Georgina N.; Alhassan, J. K.; Abdullahi, M. B
2017-05A Proposed Model for Dynamic Graphical Password Integration into ATM AuthenticationSubairu, S. O.; Alhassan, J. K.; Waziri, V. O
2016-11Evaluating Capabilities of Rootkits Tools.Alhassan, J. K.; Subairu, S. O; Misra, S
2016A Critical Analysis of Component-Based Software EngineeringSubairu, Sikiru Olanrewaju; Alhassan, J. K.
2015-10A Decision Tree Approach for Predicting Students Academic PerformanceKolo, David Kolo; Adepoju, Solomon A.; Alhassan, J. K.
2007An Evaluation of Internet Connectivity of Information Technology Firms in Minna MetropolisAlhassan, J. K.; Adepoju, S. A.
2015-12Analytical Study of Some Selected Classification Algorithms in WEKA Using Real Crime DataObuandike, Georgina N.,; Audu, Isah; Alhassan, J. K.
2015-09Performance Analysis of Artificial Neural Network with Decision Tree in Prediction of Diabetes MellitusAlhassan, J. K.; Attah, B; Misra, S
2015-07Using Data Mining Technique for Scholarship DisbursementAlhassan, J. K.; Lawal, S. A.
2015-05Factors Militating against Successful Implementation of Computer Studies in 9-Year Universal Basic Education (UBE) ProgrammeSuleiman, Garba; Adepoju, Solomon A.; Alhassan, J. K.
2015-05Review of Software Reliability Analysis Models: A Case Study of Operating SystemsAbdullahi, Muhammed B; Alhassan, J. K.; Adepoju, Solomon; Adamu, Abubakar
2015Plastic Financial Fraud in the Most Populated Black Africa; Nigeria: The Mitigation Based-On One-Time PasswordWaziri, Victor Onomza; Alhassan, J. K.; Ismaila, Idris; Tunde, Abdulrahman
2015-03The Application of Hybrid Cryptographic Algorithms for Cyber Warfare and Terrorism in a Nation DefenceWaziri, Victor Onomza; Alhassan, J. K.; Ismaila, Idris
2015-04Web-based Security Services based-on Elliptic Curves CryptosystemWaziri, Victor Onomza; Alhassan, J. K.; Danladi, Hakimi
2015Development of Secure Antivirus with the Artificial Immune System ModelWaziri, Victor Onomza; Alhassan, J. K.; Olalere, Morufu; Abdulkadir, Adamu
2014-12Big Data Analytics and the Epitome of fully Homomorphic Encryption Scheme for Cloud Computing SecurityWaziri, Victor O.; Alhassan, J. K.; Olalere, Morufu; Ismaila, Idris
2015-03Comparative Study of Inflation Rates Forecasting Using Feed-Forward Artificial Neural Networks and Auto Regressive (AR) ModelsOnimude, Bayo Mohammed; Alhassan, J. K.; Adepoju, Solomon A.
2015-01Effective Networking Model for Efficient Implementation of E-Governance: A Case Study of NigeriaOsho, Lauretta O; Abdullahi, Muhammad B; Osho, Oluwafemi; Alhassan, J. K.
2015On the Use of Decision Tree for Treatment Options in Medical DecisionMamman, Joseph Ndagatsa; Abdullahi, Muhammad Bashir; Alhassan, J. K.; Adepoju, Solomon A
2008A Proposed Model for Distributed Database System on Academic Performance of Tertiary Institutions in NigeriaAlhassan, J. K.
Collection's Items (Sorted by Submit Date in Descending order): 241 to 260 of 264