Browsing by Author Alhassan, J. K.

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 87  next >
Issue DateTitleAuthor(s)
2015-12Analytical Study of Some Selected Classification Algorithms in WEKA Using Real Crime DataObuandike, Georgina N.,; Audu, Isah; Alhassan, J. K.
2014Application of Artificial Neural Network to Stock Forecasting – Comparison with SES and ARIMAAlhassan, J. K.; Abdullahi, M. B.; Lawal, J
2015-03The Application of Hybrid Cryptographic Algorithms for Cyber Warfare and Terrorism in a Nation DefenceWaziri, Victor Onomza; Alhassan, J. K.; Ismaila, Idris
2012Artificial Neural Network as Kernel of Image Analysis Software.Nedvedz, A.; Alhassan, J. K.; Belotserkovsky, A
2015Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption.Waziri, Victor Onomza; Alhassan, J. K.; Ismaila, Idris; Dogonyaro, Moses Noel
2014-12Big Data Analytics and the Epitome of fully Homomorphic Encryption Scheme for Cloud Computing SecurityWaziri, Victor O.; Alhassan, J. K.; Olalere, Morufu; Ismaila, Idris
2020-10-07Blockchain technology in IoT systems: current trends, methodology, problems, applications, and future directionsAlfa, Abraham Ayegba; Alhassan, J. K.; Olaniyi, Olayemi Mikail; Olalere, Morufu
2017Classification of Crime Data for Crime Control Using C4.5 and Naïve Bayes TechniquesObuandike, Georgina N.; Alhassan, J. K.; Abdullahi, M. B
2018-01Comparative Analysis of Classification Algorithms for Email Spam DetectionAbdulhamid, Shafi’i Muhammad; Shuaib, Maryam; Osho, Oluwafemi; Ismaila, Idris; Alhassan, J. K.
2019-04Comparative Evaluation of Artificial Neural Network and Support Vector Machine for Money Laundering DetectionYusuf, Nimatullah; Alhassan, J. K.
2018Comparative Evaluation of Mobile Forensic ToolsAlhassan, J. K.; Oguntoye, R. T; Misra, Sanjay; Adewumi, Adewole; Maskeliunas, Rytis; Damaševicius, Robertas
2020-09A Comparative Experimental Evaluation of the Detection Rates and Removal Abilities of Fifteen Malware Detector Tools on Xpaj.MBR RootkitSubairu, S. O.; Alhassan, J. K.; Nwaocha, V. O.; Saidu, I. R.
2017-06-29Comparative Performance Study of Antimalware Tools on TDL-4 RootkitSubairu, S. O; Isah, A. O; Alhassan, J. K.
2017Comparative Performance Study of Antimalware Tools on TDL-4 RootkitSubairu, S. O.; Isah, Abdulkadir Onivehu; Alhassan, J. K.
2015-03Comparative Study of Inflation Rates Forecasting Using Feed-Forward Artificial Neural Networks and Auto Regressive (AR) ModelsOnimude, Bayo Mohammed; Alhassan, J. K.; Adepoju, Solomon A.
2015Comparative Study of Inflation Rates Forecasting Using Feed-Forward Artificial Neural Networks and Auto Regressive (AR) ModelsOnimode, Bayo Mohammed; Alhassan, J. K.; Adepoju, Solomon A
2011Comparative Study on three Major Internet Search Engines. The Information TechnologistUsman, U. A.; Alhassan, J. K.
2008Computer Usage and its Impact on Staff of Federal Ministry of Finance, Abuja, Nigeria.Alhassan, J. K.; Aliu, Grace
2016A Critical Analysis of Component-Based Software EngineeringSubairu, Sikiru Olanrewaju; Alhassan, J. K.
2016-11Data Loss Prevention and Challenges Faced in their DeploymentsWaziri, Victor O.; Ismaila, Idris; Alhassan, J. K.; Adedayo, Bolaji O.