Browsing by Title

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 25825 to 25844 of 26608 < previous   next >
Issue DateTitleAuthor(s)
2016Trypanostatic Effect of Millet-garlic Blended Diet on Rats Infected with T. b. bruceiM.H, Garba; A. Y., Kabir; Abdulkadir, Abubakar; Abdullahi, Abdulqadir; Y, Garba; Fatima Muhammad, madaki; L. M., Hafsa; S, Abubakar
2019Tungsten Inert Gas (Tig) Welding Of Austenitic Stainless Steel (Ass) : Experimental Of Chromium Carbide Formation During Tig Of Ass 304LBalogun, B.T; Alkali, Babayuwa; Abdulwahab, M.; Anunuso, Justice Chikezie
2020-03-12TUNING OF SnS THIN FILM CONDUCTIVITY ON ANNEALING IN AN OPEN AIR ENVIRONMENT FOR TRANSISTOR APPLICATIONThomas, Daniel; Uno, Uno; Isah, Kasim; Ahmadu, Umaru
2019Turning waste to wealth in opinion article titled ‘The future food system, how can we effectively build a food system for the future?’ By CTA Spore magazineUmeugochukwu, Obiageli
2012Turning Waste to Wealth: Potential of Laterized Concrete using Cassava Peels Ash (CPA) blended CementOgunbode, Ezekiel Babatunde; Akanmu, W. P.
2022-07-18A Tutorial on Cognitive Radio Principles and Spectrum SensingAbubakar Saddiq, Mohammed; Adamu, Hussaini; Zubair, Suleiman; Eberechukwu, Paulson
2008-04Two and Half Dimensional Modeling of Precambrian Rocks in Malumfashi Area of Katsina State Using Aeromagnetic Data.Rafiu, Adewuyi Abdulwaheed
2019A TWO FACTOR AUTHENTICATION PROTECTIVE SYSTEM FOR MANAGING USER LOGIN CREDENTIALSEkundayo, Ayobami; Aminu, Enesi; Alabelewe, Ridwan
2019A TWO FACTOR AUTHENTICATION PROTECTIVE SYSTEM FOR MANAGING USER LOGIN CREDENTIALSAminu, Enesi Femi; Ekundayo, Ayobami; Alabelewe, Rilwan O.
2018Two Layers Trust-Based Intrusion Prevention System for Wireless Sensor NetworksOke, J. T.; Agajo, J.; Nuhu, B. K.; Kolo, J. G.; Ajao, L. A.
2018-05-31Two Layers Trust-Based Intrusion Prevention System for Wireless Sensor NetworksNuhu Kontagora, Bello; Oke, J. T.; Agajo, J.; Kolo, J. G; Ajao, L. A
2018-04-01Two Layers Trust-Based Intrusion Prevention System for Wireless Sensor Networks,Oke, J. T.; Agajo, , J.,; Nuhu, , Kolo, J. G. & Ajao, L. A B. K.
2018Two Layers TrustTwo Layers TrustTwo Layers Trust Two Layers TrustTwo Layers TrustTwo Layers Trust Two Layers Trust Two Layers TrustTwo Layers TrustTwo Layers TrustTwo Layers Trust -Based Intrusion Prevention S Based Intrusion Prevention S Based Intrusion Prevention S Based Intrusion Prevention S Based Intrusion Prevention S Based Intrusion Prevention SBased Intrusion Prevention S Based Intrusion Prevention SBased Intrusion Prevention S Based Intrusion Prevention S Based Intrusion Prevention SBased Intrusion Prevention System for for Wireless Wireless Wireless Sensor Networks Sensor Networks Sensor Networks SensorOke, J. T.; Agajo, J; Nuhu B. K., Kolo, J. G. & Ajao, L. A.
2011A Two Point Block Hybrid Method for Solving Stiff Initial Value ProblemsMuhammad, Raihanatu
2015-12-06Two-dimensional modeling of subsurface structure over upper Benue trough and Bornu basin in north eastern NigeriaSalako, Kazeem Adeyinka; Udensi, Emeka Emmanuel
2023-03-22Two-layer Secured Graphical Authentication with One Time Password (OTP) Verification for a Web Based ApplicationsAdebayo, Olawale Surajudeen; Ganiyu, Shefiu Olusegun; Alli, Adam A; Rufai, Salihu Ahmed; Jubril, Abdullahi Monday; Abdulazeez, Lateefah; Gadzama, Emmanuel Hamman
2023-05A Two-Level Detection and Recovery Recommendation System for Depression.Ayuba, Philip S; Ojerinde, O. A; Aliyu, H. O
2012-06-02Two-phase air-water flow through a large diameter vertical 180 o return bendAbdulkadir, Mukhtar; Zhao, Donglin; Azzi, Abdulazeez; Lowndes, Ian; Azzopardi, Barry
2024-04Two-step one-pot speciation of chromium as Cr-APDC-and-NaEDTA complexes followed by ETA-AAS analysisSalihu, Simon; Abu Bakar, Nor
2023-01-20Two-Step Second Derivative Methods with Hermite Polynomial as Basis Function for Solving Stiff ProblemsMohammed, Umaru; Shehu, M.A; Salihu, N.O; Yahaya, A.A; Garba, J