Main Navigation
Main Content
Sidebar
Register
Login
Toggle navigation
HOME
JOURNALS
By Category
Alphabetically
By Country
By JPPS Rating
List All Titles
Free To Read
HOW TO USE AJOL
For Researchers
For Librarians
For Authors
FAQ's
RESOURCES
For Journals
For Researchers
For Authors
For Policy Makers
SUPPORTERS
Journal of Computer Science and Its Application
Journal /
Journal of Computer Science and Its Application
/
Vol. 23 No. 1 (2016)
/ Articles
Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Published:
2017-03-29
Articles
Cloud model construct for transaction-based cooperative systems
A.A. Ajuwon, R.O. Oladele
1-9
DOI:
download
Requires Subscription
PDF
A proactive approach of measuring the impacts of information security awareness on social networks
J.O.K. Okesola, A.A. Owoade, A.S. Ogunbanwo
10-20
DOI:
download
Requires Subscription
PDF
Impacts of security dimensions on awareness measurement in social networking
J.O.K. Okesola, A.A. Owoade, O.W. Adesanya, F.M. Babalola
21-29
DOI:
download
Requires Subscription
PDF
Managing projects in a digital government
B.C. Onyemaobi, V.E. Ejiofor
30-39
DOI:
download
Requires Subscription
PDF
Fuzzy cluster means algorithm for the diagnosis of confusable disease
G.G. James, A.E. Okpako, J.N. Ndunagu
40-52
DOI:
download
Requires Subscription
PDF
A computerized legal information management system
K Ohiagu, O Omorogiuwa
53-64
DOI:
download
Requires Subscription
PDF
Gender recognition using local binary pattern and Naive Bayes Classifier
R.S. Babatunde, S.O. Abdulsalam, S.R. Yusuff, A.N. Babatunde
65-74
DOI:
download
Requires Subscription
PDF
Overview of NoSQL and comparison with SQL database management systems
V.E. Ejiofor, K.K. Okeke
75-86
DOI:
download
Requires Subscription
PDF
Adaptive guard channel allocation scheme with buffer for mobile network
O.A. Ojesanmi, O Oyedele, O.R. Vincent, M Olayiwola
87-97
DOI:
download
Requires Subscription
PDF
The evaluation of tertiary institution service quality using HiEdQUAL and fuzzy TOPSIS
O.O. Oladipupo, T.O. Amoo, O.J. Daramola
98-115
DOI:
download
Requires Subscription
PDF
CyberProtector: identifying compromised URLs in electronic mails with Bayesian Classification
N.A. Azeez, O Ademolu
DOI:
download
Requires Subscription
PDF
AANtID: an alternative approach to network intrusion detection
N.A. Azeez, A.B. Babatope
129-143
DOI:
download
Requires Subscription
PDF