Collection's Items (Sorted by Submit Date in Descending order): 161 to 180 of 248
Issue Date | Title | Author(s) |
2016-03-01 | Resource Scheduling for Infrastructure as a Service (IaaS) in Cloud Computing: Challenges and Opportunities | Madni, Syed Hamid Hussain; Abdulhamid, Shafi’i Muhammad; Yahaya, Coulibaly; Abdulhamid, Shafi’i Muhammad |
2017-08-02 | Symbiotic Organism Search Optimization Based Task Scheduling in Cloud Computing Environment | Abdullahi, Mohammed; Ngadi, Md Asri; Abdulhamid, Shafi’i Muhammad |
2017-04-06 | Optimal Resource Scheduling for IaaS Cloud Computing using Cuckoo Search Algorithm | Abdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Abdul—Salaam, Gaddafi; Madni, Syed Hamid Hussain |
2017-03-02 | Optimal Resource Scheduling for IaaS Cloud Computing using Cuckoo Search Algorithm | Madni, Syed Hamid Hussain; Abd Latiff, Muhammad Shafie; Abdulhamid, Shafi’i Muhammad |
2019-06 | EVALUATION OF MOBILE BANKING SERVICES USAGE IN MINNA, NIGER STATE | Baba, Meshach; DOGONYARO, NOEL MOSES; Yisa, Victor L.; OLATUNDE, MAJEEDAH OMOBOLANLE |
2014-09 | Evaluation of Business Continuity and Information Disaster Recovery Mechanism in Top Universities in North Cyprus | Yisa, Victor L.; Baba, Meshach |
2017-12-04 | Distributed Denial of Service Detection using Multi Layered Feed Forward Artificial Neural Network | Ismaila, Idris; Obi, Blessing Fabian; Abdulhamid, Shafi’i M.; Olalere, Morufu; Baba, Meshach |
2018-09 | PASSWORD KNOWLEDGE VERSUS PASSWORD MANAGEMENT | ADAMA, VICTOR N.; DOGONYARO, NOEL MOSES; Yisa, Victor L.; Baba, Meshach; AYOBAMI, EKUNDAYO |
2012-12 | THE SIMULATION OF PATH CONTROL AND ROUTE REDISTRIBUTION TECHNIQUES ON THE INTEGRATION OF WANs WITH DIFFERENT ROUTING PROTOCOLS | Abdulhamid, S. M.; Yisa, Victor L.; Baba, meshach; Njoku, C.O |
2019-05 | Towards a Digital Policing in Developing Nations: The Nigerian Context | Ismaila, Idris; Yisa, Victor L.; Ikuesan, Adeyemi R.; Imavah, Shaka A.; Mohammad, Abdullahi B.; Abduldayan, Fatimah J; Baba, meshach |
2017-06-07 | Secure e-examination systems compared: Case studies from two countries | Fluck, Andrew; Adebayo, Olawale S.; Abdulhamid, Shafi’i Muhammad |
2017-06-04 | A Review on Mobile SMS Spam Filtering Techniques | Abdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Chiroma, Haruna; Osho, Oluwafemi; Abdul-Salaam, Gaddafi; Abubakar, Adamu I.; Herawan, Tutut |
2017-07-12 | Performance Comparison of Heuristic Algorithms for Task Scheduling in IaaS Cloud Computing Environment | Madni, Syed Hamid Hussain; Abd Latiff, Muhammad Shafie; Mohammed, Abdullahi; Ngadi, M. A.; Abdulhamid, Shafi’i Muhammad |
2018-05-01 | Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature Techniques | Ojeniyi, Joseph A.; Adedayo, Bolaji O.; Ismaila, Idris; Abdulhamid, Shafi’i Muhammad |
2018-05-12 | A Cloud-based Conceptual Framework for Multi-Objective Virtual Machine Scheduling using Whale Optimization Algorithm | Rana, Nadim; Abd Latiff, Shafie Muhammad; Abdulhamid, Shafi’i Muhammad |
2011 | Weather flow patterns visualization using data minning technique with emphasis on rain fall. . Vol. 1(1) pa | Olagunju, M.; Taiwo, Adebayo Omotayo; Ameen, A. O.; Mabayoje, Modina A.; Adebayo, Olawale Surajudeen |
2018-07-02 | Security Risk Analysis and Management in mobile wallet transaction: A Case study of Pagatech Nigeria Limited | Abdulrahaman, Musbau D.; Alhassan, John K.; Ojeniyi, Joseph A.; Abdulhamid, Shafi’i Muhammad |
2018-08-02 | Development of Blowfish Encryption Scheme for Secure Data Storage in Public and Commercial Cloud Computing Environment | Abdulhamid, Shafi’i Muhammad; Sadiq, Nafisat Abubakar; Abdullahi, Mohammed; Rana, Nadim; Chiroma, Haruna; Gbenga, Dada Emmanuel |
2018-10-06 | An Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian Classifier | Christopher, Haruna Atabo; Yakubu, Jimoh; Abdulhamid, Shafi’i Muhammad; Mohammed, Abdulmalik D |
2018-02-10 | An Intelligent Crypto-locker Ransomware Detection Technique using Support Vector Machine Classification and Greywolf Optimization Algorithm | Maigida, Abdullahi Mohammed; Abdulhamid, Shafi’i Muhammad; Morufu, Olalere |
Collection's Items (Sorted by Submit Date in Descending order): 161 to 180 of 248