PROMOTING ACCESS TO AFRICAN RESEARCH

Journal of Computer Science and Its Application

Log in or Register to get access to full text downloads.

Remember me or Register

Journal Homepage Image

The journal provides a multidisciplinary forum for the publication of original research and technical papers, short communications, state-of-art computing and review papers on advances, techniques, practice, and applications of Computer Science.

Other websites associated with this journal: http://www.publication.ncs.org.ng/


Vol 23, No 1 (2016)

DOWNLOAD FULL TEXT Open Access  DOWNLOAD FULL TEXT Subscription or Fee Access

Table of Contents

Articles

Cloud model construct for transaction-based cooperative systems EMAIL FULL TEXT
DOWNLOAD FULL TEXT
A.A. Ajuwon, R.O. Oladele 1-9
A proactive approach of measuring the impacts of information security awareness on social networks EMAIL FULL TEXT
DOWNLOAD FULL TEXT
J.O.K. Okesola, A.A. Owoade, A.S. Ogunbanwo 10-20
Impacts of security dimensions on awareness measurement in social networking EMAIL FULL TEXT
DOWNLOAD FULL TEXT
J.O.K. Okesola, A.A. Owoade, O.W. Adesanya, F.M. Babalola 21-29
Managing projects in a digital government EMAIL FULL TEXT
DOWNLOAD FULL TEXT
B.C. Onyemaobi, V.E. Ejiofor 30-39
Fuzzy cluster means algorithm for the diagnosis of confusable disease EMAIL FULL TEXT
DOWNLOAD FULL TEXT
G.G. James, A.E. Okpako, J.N. Ndunagu 40-52
A computerized legal information management system EMAIL FULL TEXT
DOWNLOAD FULL TEXT
K Ohiagu, O Omorogiuwa 53-64
Gender recognition using local binary pattern and Naive Bayes Classifier EMAIL FULL TEXT
DOWNLOAD FULL TEXT
R.S. Babatunde, S.O. Abdulsalam, S.R. Yusuff, A.N. Babatunde 65-74
Overview of NoSQL and comparison with SQL database management systems EMAIL FULL TEXT
DOWNLOAD FULL TEXT
V.E. Ejiofor, K.K. Okeke 75-86
Adaptive guard channel allocation scheme with buffer for mobile network EMAIL FULL TEXT
DOWNLOAD FULL TEXT
O.A. Ojesanmi, O Oyedele, O.R. Vincent, M Olayiwola 87-97
The evaluation of tertiary institution service quality using HiEdQUAL and fuzzy TOPSIS EMAIL FULL TEXT
DOWNLOAD FULL TEXT
O.O. Oladipupo, T.O. Amoo, O.J. Daramola 98-115
CyberProtector: identifying compromised URLs in electronic mails with Bayesian Classification EMAIL FULL TEXT
DOWNLOAD FULL TEXT
N.A. Azeez, O Ademolu
AANtID: an alternative approach to network intrusion detection EMAIL FULL TEXT
DOWNLOAD FULL TEXT
N.A. Azeez, A.B. Babatope 129-143


ISSN: 2006-5523
AJOL African Journals Online