Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Ayisat Wuraola Asaju-Gbolagade"'
Autor:
Kayode Sakariyau Adewole, Abdullateef Oluwagbemiga Balogun, Muiz Raheem, Muhammed K. Jimoh, Rasheed Gbenga Jimoh, Modinat Abolore Mabayoje, Fatima E. Usman-Hamza, Abimbola Ganiyat Akintola, Ayisat Wuraola Asaju-Gbolagade
Publikováno v:
Jordanian Journal of Computers and Information Technology, Vol 7, Iss 2, Pp 130-151 (2021)
Sentiment analysis has recently drawn considerable research attentions in the recent years owing to its applicability in determining users opinion, sentiment and emotions from large collections of textual data. The goal of sentiment analysis centered
Externí odkaz:
https://doaj.org/article/2f99587837af4aa096e13cc364d2244d
Publikováno v:
Malaysian Journal of Computing, Vol 6, Iss 2, Pp 798-811 (2021)
Wireless Sensor Networks (WSNs) consist of huge number of sensor nodes dispersed in a domain of enthusiasm with at least one sink for watching the environment and physical situation. These sensor hubs are circulated in threatening conditions and are
Externí odkaz:
https://doaj.org/article/0b127c7e0a75450c813fe06bb43e48d4
Autor:
Ayodele Kamaldeen Raji, Idris Abiodun Aremu, Ayisat Wuraola Asaju-Gbolagade, Kazeem Alagbe Gbolagade
Publikováno v:
Scientific Inquiry and Review. 5
Wireless Sensor Networks (WSNs) subsist on network of huge numbers of hubs that are distributed in unfriendly environments used for habitat monitoring and to observe changes in phenomena. These hubs are susceptible to faults such as energy exhaustion
Autor:
Rafiu Mope Isiaka, K. J. Muhammed, Kayode S. Adewole, Kazeem Alagbe Gbolagade, Ayisat Wuraola Asaju-Gbolagade
Publikováno v:
Machine Learning and Data Mining for Emerging Trend in Cyber Dynamics ISBN: 9783030662875
Encryption schemes that allow computation to be performed on an encrypted data are required in modern real-world applications. This technology is a necessity for cloud computing, processing resources and share storage, in order to preserve integrity
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ca9f118d6b02e100b8f00e4f1b3d28dc
https://doi.org/10.1007/978-3-030-66288-2_8
https://doi.org/10.1007/978-3-030-66288-2_8
Autor:
Kayode S. Adewole, Ayisat Wuraola Asaju-Gbolagade, Kazeem Alagbe Gbolagade, Rafiu Mope Isiaka, Kamaldeen Jimoh Muhammed
Publikováno v:
Communications in Computer and Information Science ISBN: 9783030896539
Fully Homomorphic Encryption (FHE) supports realistic computations on encrypted data and hence it is widely proposed to be used in cloud computing to protect the integrity and privacy of data stored in the cloud. The existing symmetric-based FHE sche
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::32e623a5975f7165f58403424bc04a90
https://doi.org/10.1007/978-3-030-89654-6_27
https://doi.org/10.1007/978-3-030-89654-6_27
Autor:
Oluwatobi Noah Akande, Muhammed K. Jimoh, M. A. Mabayoje, Muiz O. Raheem, Fatima E. Usman-Hamza, Kayode S. Adewole, Abimbola G. Akintola, Ayisat Wuraola Asaju-Gbolagade, Rasheed Gbenga Jimoh, Abdullateef Oluwagbemiga Balogun, Victor Elijah Adeyemo
Publikováno v:
Heliyon
Heliyon, Vol 7, Iss 7, Pp e07437-(2021)
Heliyon, Vol 7, Iss 7, Pp e07437-(2021)
The phishing attack is one of the most complex threats that have put internet users and legitimate web resource owners at risk. The recent rise in the number of phishing attacks has instilled distrust in legitimate internet users, making them feel le