PROMOTING ACCESS TO AFRICAN RESEARCH

Browse Title Index

Log in or Register to get access to full text downloads.

Remember me or Register


 
Issue Title
 
Vol 25, No 2 (2018) A career guide decision support system: The Birkman approach Abstract
B. I. Akhigbe, O. O. Akhigbe, T.O. Ajayi, B. S. Afolabi, E. N. Asikhia
 
Vol 22, No 2 (2015) A collaborative agents - based valuation system Abstract
B.O. Akinyemi, D.A. Olalere, G.A. Aderounmu
 
Vol 23, No 1 (2016) A computerized legal information management system Abstract
K Ohiagu, O Omorogiuwa
 
Vol 19, No 1 (2012) A Conceptual Trust Model for Managing E-Commerce Environment Abstract
OR Vincent, OE Agbola
 
Vol 22, No 1 (2015) A framework for secure data sharing in the cloud Abstract
O. P. Akomolafe, I. D. Taiwo
 
Vol 19, No 1 (2012) A Generic Maximum Delay Model of a Packet Switch Abstract
MO Eyinagho, SO Falaki
 
Vol 22, No 1 (2015) A hybrid approach to masquerade detection Abstract
A. S. Sodiya, S. A. Onashoga, T. Solarin-sodara, O. J. Falana
 
Vol 21, No 2 (2014) A hybrid fingerprint identification system for immigration control using the Minutiae and correlation methods Abstract
J.B. Awotunde, O.W. Fatai, M.B. Akanbi, S.I. Abdulkadir, O.F. Idepefo
 
Vol 22, No 1 (2015) A hybrid fingerprint identification system for immigration control using the minutiae and correlation methods Abstract
J. B. Awotunde, O.W. Fatai, M. B. Akanbi, D. I. Abulkadir, O. F. Idepefo
 
Vol 25, No 2 (2018) A model for forecasting cumulative grade point average score (performance) Abstract
A. Abiodun, O. Aweh, G. M. M. Obi
 
Vol 24, No 2 (2017) A model-based collaborative filtering with dimensionality reduction Abstract
A. Philip Adewole, C. Victor Kawedo
 
Vol 24, No 2 (2017) A model-based collaborative filtering with dimensionality reduction Abstract
A. Philip Adewole, C. Victor Kawedo
 
Vol 25, No 1 (2018) A new two-tiered strategy to e-examination system Abstract
A.J. Ikuomola
 
Vol 25, No 2 (2018) A pattern matching model for identifying deception Abstract
I. T. Ayorinde, P. N. Idyorough
 
Vol 23, No 1 (2016) A proactive approach of measuring the impacts of information security awareness on social networks Abstract
J.O.K. Okesola, A.A. Owoade, A.S. Ogunbanwo
 
Vol 25, No 1 (2018) A PROMETHEE based evaluation of software defect predictors Abstract
R.G. Jimoh, A.O. Balogun, A.O. Bajeh, S Ajayi
 
Vol 19, No 1 (2012) A Secured Protocol For Preventing Online Dictionary Attack Abstract
SA Onashoga, AT Akinwale
 
Vol 19, No 1 (2012) A Trustworthy SMS Based Voting System Architecture Abstract
AM Olugbenga, A Oludele, JJ Vincent, OS Maitanmi, SO Okolie
 
Vol 20, No 2 (2013) A web-based platform for mobile learning management system Abstract
A.J. Ikuomola, O.N. Nureni
 
Vol 23, No 1 (2016) AANtID: an alternative approach to network intrusion detection Abstract
N.A. Azeez, A.B. Babatope
 
Vol 23, No 1 (2016) Adaptive guard channel allocation scheme with buffer for mobile network Abstract
O.A. Ojesanmi, O Oyedele, O.R. Vincent, M Olayiwola
 
Vol 21, No 2 (2014) Adaptive neuro-fuzzy system for malware detection Abstract
A.S. Sodiya, O.J. Falana, S.A. Onashoga, B.S. Badmus
 
Vol 24, No 2 (2017) Adoption of Internet of Things (IoT) among organizations in Lagos State, Nigeria Abstract
Emoghene Ogidiaka, Philip Odion, Martins E. Irhebhude
 
Vol 24, No 2 (2017) Algorithm development simulator for human heart beat rate Abstract
M Olagunju, A.E. Adeniyi
 
Vol 25, No 2 (2018) An Algorithm for Measuring Intellectual Capital of a University Abstract
O. B. Okunoye, O.E Afolabi
 
Vol 20, No 2 (2013) An efficient image cryptosystem based on wolfram sequence and RNS Abstract
S. Alhassan, K.A. Gbolagade
 
Vol 21, No 1 (2014) An Erlang-like model using SDCCH dimensioning and reattempt phenomenon for GSM congestion control Abstract
O.F.W. Onifade, S.O. Ademola
 
Vol 22, No 1 (2015) An evaluation of classification algorithms for intrusion detection Abstract
A. J. Ikuomola
 
Vol 17, No 2 (2010) An Implementation of a Network Configuration Management System Using Mobile Agent Abstract
O Oluwaseyitanfunmi
 
Vol 21, No 1 (2014) An improved model for identifying influential bloggers on the web Abstract
R.G. Jimoh, A.J. Bamidele, O.A. Enikuomehin
 
Vol 25, No 1 (2018) An Information Technology (IT) equipment fault prediction system for an it support unit Abstract
P.S. Adamade, E.O. Nwachukwu
 
Vol 22, No 1 (2015) An intelligent clustering based methodology for confusable diseases diagnosis and monitoring Abstract
O. U. Obot, U. G. Inyang
 
Vol 22, No 1 (2015) An intelligent trust-based access control model for affective crowdsourcing Abstract
O. Folorunso, O. A. Mustapha
 
Vol 25, No 1 (2018) An ontology based approach for improving job search in online job portals Abstract
O.S. Dada, A.F.D. Kana, S.E. Abdullahi
 
Vol 21, No 2 (2014) An ontology-based intrusion patterns classification system Abstract
A. J. Shonubi, A.F. Adekoya, A.S. Sodiya, O.T. Mewomo
 
Vol 25, No 2 (2018) Analysis of algorithms in long term evolution (LTE) network Abstract
B. M. Kuboye, A. J. Gabriel, A. F. Thompson, V. O. Joseph
 
Vol 22, No 2 (2015) Analysis of two-phased approaches to load balancing in cloud computing Abstract
O.O. Ajayi, F. A. Oladeji, C.O. Uwadia
 
Vol 21, No 1 (2014) Analysis on geometry-aware received signal strength based positioning techniques Abstract
F.M. Dahunsi
 
Vol 25, No 2 (2018) Application of waterfall model for secondary schools' result processing Abstract
R.O. Bello, M. Olugbebi, S. I. Bello, A. O. Babatunde, O. B. Bello
 
Vol 21, No 2 (2014) Architectural model for crowdsourcing for human security threats situation information Abstract
O. Folorunso
 
Vol 19, No 2 (2012) Artificial neural network model for Yoruba character recognition Abstract
MZ Adebowale, AA Philip, AA Teofiki
 
Vol 25, No 2 (2018) Artificial neural network-based learning analytics technique for employability and self-sustenance Abstract
E. Okewu, P. Adewole
 
Vol 19, No 1 (2012) Assessing Network Services and Security in Nigeria Universities Abstract
OAT Aladesanmi, BS Afolabi, TO Oyebisi
 
Vol 19, No 2 (2012) Automated students' attendance taking in tertiary institution using hybridized facial recognition algorithm Abstract
TT Agagu, BA Akinnuwesi
 
Vol 20, No 2 (2013) Black-box optimization benchmarking of PRCGA on noisy testbed Abstract
B.A. Sawyerr, E.P. Fashina, O.O. Adeyemo
 
Vol 24, No 2 (2017) Character recognition from image using radial basis function neural Abstract
C.O. Yinka-Banjo, R Isimeto, A.O. Adebowale
 
Vol 23, No 1 (2016) Cloud model construct for transaction-based cooperative systems Abstract
A.A. Ajuwon, R.O. Oladele
 
Vol 21, No 1 (2014) Combined measures against SQL-Injection attacks Abstract
R. Mac’Odo, L.N. Onyejegbu
 
Vol 22, No 2 (2015) Combined model of 9x9 playfair and RSA for securing confidential information Abstract
Y.B. Zakariyau, L.J. Muhammad, A.M. Usman, A Garba
 
Vol 22, No 2 (2015) Comparative analysis of data encryption techniques to secure data in oracle database Abstract
P.E. Okimba, B.Y. Baha
 
1 - 50 of 129 Items 1 2 3 > >> 


ISSN: 2006-5523
AJOL African Journals Online