Information and Media Technology : [89] Collection home page

Information and Media Technology

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 89
Issue DateTitleAuthor(s)
2022DIABETES RETINOPATHY SEVERITY GRADING USING MULTI- SCALE IMAGE PYRAMID TECHNIQUESMuhammad, J. G. Yunusa; Aliyu, Hamzat Olanrewaju; Sulaimon, A. Bashir; Mohammed, Danlami Abdulmalik
2022MACHINE LEARNING MODELS FOR RISK MANAGEMENT IN NIGERIAN CUSTOMS: AN INVESTIGATIVE PERFORMANCE ANALYSISNusa, Aisha M. K.; Alhassan, John Kolo; Aliyu, Hamzat Olanrewaju; Abdullahi, I. M
2022-02REGISTRATION AND VERIFICATION OF BIRTH CERTIFICATE USING BLOCKCHAIN TECHNOLOGYBENNETT, CHIMDINMA UCHE; OJERINDE, OLUWASEUN ADENIYI; ALIYU, HAMZAT OLANREWAJU; ADEPOJU, ADELOWO SOLOMON
2022-03Effect of Temperature Compensator in Thermal Efficiency Management in Data CentreC.T. IKwazom, D.O Njoku; E.C Nwokorie, I.A. Aaefule; O.C Nwokonkwo, J.E Jibiri; T.C Okeahialam, F.U Madu
2022-03Effect of Temperature Compensator in Thermal Efficiency Management in Data CentreC.T. IKwazom, D.O Njoku; E.C Nwokorie, I.A. Aaefule; O.C Nwokonkwo, J.E Jibiri; T.C Okeahialam, F.U Madu
2015Digital Forensic Analysis for Enhancing Information SecurityOjeniyi, Sulaiman I.; Ade, Ganiyu, S.O. A.Y.; Alabi, I.O.
2016Detecting Fraud Transactions Using Radial Basis Function-Artificial Neural NetworkAlabi, Jimoh, R.G. I.O.
2015Enhanced information hiding using symmetric encryption technique and least significant bits steganographic design approachAdebayo, Bolaji, A. A.; Suleiman, Ganiyu, S.O. I.; Alabi, I.O.
2009Towards Understanding Software Engineering Ethical Frameworks Supporting Professional Bodies Ethical PrincipleOriogun, Peter; Babakano, Faiza; Chiejina, Peter; Chiroma, Fatima; Khanoba, Malachy
2016-09-27Students’ Academic Performance Modelling and Prediction: A Fuzzy-Based Approach.Etuk, Stella; Oyefolahan, Ishaq; Zubairu, Abubakar Hussein; Babakano, Faiza
2015Performance Metrics for Image Segmentation Techniques: A ReviewBabakano, Faiza Jada; Aibinu, Musa Abiodun; Onumanyi, Adeiza James
2016ICT Based Framework for Solid Waste Collection, Transfer and DisposalBabakano, Faiza Jada; Oyefolahan, Ishaq; Zubairu, Abubakar Hussein; Etuk, Stella
2014-04ALLIGNING ICT STRUCTURES WITH NATIONAL SECURITY POLICYAlabi, I.O.; Ganiyu, S.O.; Adesuyi, F.A.; Muhammad-Bello, B.
2013-04Powering Data Centres with Renewable Energy in Nigeria: Challenges and ProspectsAlabi, I.O.; Ganiyu, S.O.
2015-06Towards modeling financial fraud detection using radial basis function – artificial neural networkAlabi, I.O.; Jimoh, R.G.
2019-07ICT ARCHITECTURE FOR NATIONAL SECURITYAlabi, I.O.; Ojeniyi, J.A.; Ismail, A.A.; Ahmad, S;; Abdulazeez, H.T.
2018-04THE PROSPECT OF ADDRESSING PROPERTY MANAGEMENT CHALLENGES WITH INFORMATION AND COMMUNICATION TECHNOLOGY (ICT): A SURVEY OF MINNA METROPOLIS, NIGER STATEGaniyu, S.O.; Essien, C.F.; Alabi, I.O.; Ukam, V.J.
2018-04HIERARCHY EXTRACTION FOR COVERT NETWORK DESTABILIZATION AND COUNTERTERRORISM MECHANISMHIERARCHY EXTRACTION FOR COVERT NETWORK DESTABILIZATION AND COUNTERTERRORISM MECHANISMIsmail, A.A.; Ganiyu, S.O.; Alabi, I.O.; Abdulrazaq, A.A.; Muritala, S.
2014Awareness of Green IT towards Improving Environmental Sustainability in Varsities: Case Study of Federal University of Technology Minna, NigeriaEnagi, Alhassan Mohammed; Ganiyu, Shefiu Olusegun; Abraham, Ochoche
2015Towards A Quantitative Risk Evaluation Model for Risk-Aware Access Control In Pervasive EnvironmentGaniyu, Shefiu. O.; Jimoh, R. G.
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 89