Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 248
Issue Date | Title | Author(s) |
2012-02-02 | Investigating the Potential of Wind as a Recovery Improvement of Building Integrated Photovoltaic’s Tiled Roof Using Indoor Solar Simulator | Mambo, AbdulHamid D.; Zubair, Suleiman; AbdulAzeez, Hassan T |
2012-08-20 | The Simulation of Path Control and Route Redistribution Techniques on the Integration of WANs with Different Routing Protocols | Abdulhamid, Shafi’i Muhammad; Baba, M; Yisa, V.L.; Njoku, C.O. |
2010-10-02 | Windows Vista Kernel-Mode: Functions, Security Enhancements and Flaws | Abdulmalik, Mohammed; Abdulhamid, Shafi’i Muhammad |
2010-09-20 | Destination Information Management System for Tourist. | Abdulhamid, Shafi’i Muhammad; Gana, Usman |
2010-03-20 | Design Evaluation of Some Nigerian University Portals: A Programmer's Point of View | Abdulhamid, Shafi’i Muhammad; Ismaila, Idris |
2010-03-13 | E- Exams System for Nigerian Universities with Emphasis on Security and Result Integrity | Olawale, Adebayo; Abdulhamid, Shafi’i Muhammad |
2011-08-02 | Academic Community Cyber cafes - A Perpetration Point for Cyber Crimes in Nigeria | Chiroma, Haruna; Abdulhamid, Shafi’i Muhammad; Abdul—Salaam, Y. G; Usman, Ali Muhammad; Maigari, Timothy Umar |
2011-07-05 | Privacy and National Security Issues in Social Networks: The Challenges | Abdulhamid, Shafi’i Muhammad; Ahmad, Sulaiman; Waziri, Victor O.; Jibril, Fatima N. |
2011-09-07 | Analyzing Membership Profile Privacy Issues in Online Social Networks | Abdulhamid, Shafi’i Muhammad; Abdulazeez, Hassan T.; Abrahamand, Ochoche; Mohammed, Umar |
2011-10-13 | The Application of Decidability Theory in Identifying Similar Computer Networks | Abdulhamid, Shafi’i Muhammad; Waziri, Victor O.; Idris, Laminu |
2011-10-13 | Cybercrimes and The Nigerian Academic Institution Networks | Abdulhamid, Shafi’i Muhammad; Haruna, Chiroma; Abubakar, Adamu |
2012-07-20 | Steganography and Its Applications in Information Dessimilation on the Web Using Images as Security Embeddment: A Wavelet Approach | Waziri, Victor Onomza; Isah, Audu; Ochoche, Abraham; Abdulhamid, Shafi’i Muhammad |
2012-05-13 | Dynamic Interactive 3D Mobile Navigation Aid | Adam, A.I.; Mantoro, T.; Abdulhamid, Shafi’i Muhammad |
2013-08-02 | Combating Terrorism with Cybersecurity: The Nigerian Perspective | Osho, Oluwafemi; Adeyinka, Adesuyi Falaye; Abdulhamid, Shafi’i Muhammad |
2013-03-13 | The Design and Development of Real-Time E-Voting System in Nigeria with Emphasis on Security and Result Veracity | Abdulhamid, Shafi’i Muhammad; Adebayo, Olawale Surajudeen; Ugiomoh, Damian Oshomah; Abdulmalik, Mohammed Danlami |
2013-05-20 | Controlling Citizen’s Cyber Viewing Using Enhanced Internet Content Filters | Abdulhamid, Shafi’i Muhammad; Fasilat, Ibrahim |
2013-06-13 | Cyber Crimes Analysis Based-On Open Source Digital Forensics Tools | Waziri, Victor O.; Okongwu, N. O; Isah, Audu; Olawale, A S; Abdulhamid, Shafi’i Muhammad |
2014-10-13 | Email Spam Detection Generation Algorithm for Negative Selection Algorithm with Hamming Distance Partial Matching Rules | IDRIS, ISMAILA; Abdulhamid, Shafi’i Muhammad; Mohammed, A; Suleiman, U. D.; Akosu, N |
2014-03-20 | On-Demand Grid Provisioning using Cloud Infrastructures and Related Virtualization Tools: A Survey and Taxonomy | Abdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Bashir, Mohammed Bakri |
2014-05-13 | Tasks Scheduling Technique Using League Championship Algorithm for Makespan Minimization in IaaS Cloud | Abdulhamid, Shafi’i Muhammad; Abd Latiff, Muhammad Shafie; Ismaila, Idris |
Collection's Items (Sorted by Submit Date in Descending order): 61 to 80 of 248