Zobrazeno 1 - 10
of 47
pro vyhledávání: '"Adetunmbi, Adebayo"'
Autor:
Ugwu, Chukwuemeka Christian, Oyewole, Abisola Rukayat, Popoola, Olugbemiga Solomon, Adetunmbi, Adebayo Olusola, Elebute, Ayo
Publikováno v:
In Franklin Open December 2024 9
Publikováno v:
In: Arai K., Kapoor S., Bhatia R. (eds) Intelligent Systems and Applications. IntelliSys 2020. Advances in Intelligent Systems and Computing, Springer, Cham. 1251, 511-528. Springer, Cham
In this paper, a feedback integrated multi-criteria group decision support model for contractor selection was proposed.
Comment: 20 pages, 2 figures
Comment: 20 pages, 2 figures
Externí odkaz:
http://arxiv.org/abs/2112.00797
Publikováno v:
In Scientific African September 2020 9
Autor:
Mebawondu, J. Olamantanmi, Alowolodu, Olufunso D., Mebawondu, Jacob O., Adetunmbi, Adebayo O.
Publikováno v:
In Scientific African September 2020 9
Publikováno v:
In Scientific African September 2020 9
Autor:
Jongbo, Olayinka Ayodele, Adetunmbi, Adebayo Olusola, Ogunrinde, Roseline Bosede, Badeji-Ajisafe, Bukola
Publikováno v:
In Scientific African July 2020 8
Autor:
Dada, Emmanuel Gbenga, Bassi, Joseph Stephen, Chiroma, Haruna, Abdulhamid, Shafi'i Muhammad, Adetunmbi, Adebayo Olusola, Ajibuwa, Opeyemi Emmanuel
Publikováno v:
In Heliyon June 2019 5(6)
Autor:
Junior Gabriel Arome, Alese Boniface Kayode, Adetunmbi Adebayo Olusola, Adewale Olumide Sunday, Sarumi Oluwafemi Abimbola
Publikováno v:
Open Computer Science, Vol 9, Iss 1, Pp 292-298 (2019)
Security (privacy, confidentiality and integrity) of pre-electoral, electoral and post electoral phases of the electioneering process is fundamental to the success of Electronic Voting (E-Voting) Systems. Crystography, which is the combination of cry
Externí odkaz:
https://doaj.org/article/9e024da7785e4974bc9fd5d4f7297f3e
Publikováno v:
In Procedia Computer Science 2018 126:596-605
Publikováno v:
The International Journal of Recent Technology and Engineering (IJRTE). 9:223-232
The proliferation of Malware on computer communication systems posed great security challenges to confidential data stored and other valuable substances across the globe. There have been several attempts in curbing the menace using a signature-based