Search


Current filters:

Start a new search
Add filters:

Use filters to refine the search results.


Results 1-10 of 17 (Search time: 0.005 seconds).
Item hits:
Issue DateTitleAuthor(s)
2013-11Robustness of Split-plot Central Composite Designs in the Presence of a Single Missing Observation.Unna Chukwu, Angela; Yakubu, Yisa; Bamiduro, Timothy Adebayo; Amahia, Godwin Nwonzo
2013-06Effect of dressing of hot water-steeped and unsteeped seeds on longevity and seedling emergence in Corchorus olitorious L.Ibrahim, H.; Oladiran, J. A.,; Adeyemi, R. A.; Danladi, M. M.
2013-02A HIERARCHICAL CLUSTER ANALYSIS AND SIMULATION OF STATE CAPITALS IN NIGERIA FOR TOURISM EXPLORATIONAudu, Isah; Usman, Abdullahi; Victor, O.Waziri
2013A Negative Selection Algorithm Based on Email Classification TechniquesVictor, Onomza Waziri; Ismaila, Idris; Mohammed, Bashir Abdullahi; Hahimi, Danladi; Audu, Isah
2013A Conceptual Nigeria Stock Exchange Prediction: Implementation Using Support Vector Machines-SMO ModelAbubakar, S. Magaji; Audu, Isah; Victor, Onomza Waziri; Adeboye, K.R.
2013-11-10Application of multivariate methods for assessment of variations in rivers/streams water quality in Niger State, NigeriaAudu, Isah; Usman, Abdullahi; Muhammed, Muhammed Ndamitso
2013-04APPLICATION OF GROUP-DEPENDENT TRANSFORMATION OF FISHER S DISCRIMINANT ANALYSIS IN A UNIVERSITY OF TECHNOLOGYIsah, Audu; Abdullahi, Usman
2013-04Application of Group-dependent Transformation of Fisher's Discriminant Analysis in a University of TechnologyAudu, Isah; Usman, Abdullahi
2013-01Cyber Crimes Analysis Based-On Open Source Digital Forensics ToolsVictor, O. Waziri; Okongwu, N. O; Audu, Isah; Olawale, S. Adebayo; Shafi’í, Mohammed Abdulhamid
2013Network Security in Cloud Computing with Elliptic Curve CryptographyVictor, O. Waziri; Ojeniyi, J. Adebayo; Hakimi, Danladi; Audu, Isah; Abubakar, S. Magaji; Muhammad, Bashir Abdullahi