Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Iwasokun, Gabriel Babatunde"'
Autor:
Iwasokun, Gabriel Babatunde, Akinyede, Richard Olufemi, Fadamiro, Catherine Folake, Bello, Oniyide Alabi
Publikováno v:
Journal of Financial Crime, 2019, Vol. 26, Issue 1, pp. 113-130.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/JFC-11-2017-0120
Publikováno v:
Journal of Computer and Communications. 11:166-189
Autor:
Ogunlana, Samuel Olutayo1, Iwasokun, Gabriel Babatunde2 gbiwasokun@futa.edu.ng, Olabode, Olatubosun3
Publikováno v:
International Journal of Information Security Science. Sep2021, Vol. 10 Issue 3, p75-85. 11p.
Publikováno v:
Iran Journal of Computer Science; Dec2022, Vol. 5 Issue 4, p317-328, 12p
Publikováno v:
Iran Journal of Computer Science; Mar2022, Vol. 5 Issue 1, p1-16, 16p
Publikováno v:
Iran Journal of Computer Science; Dec2021, Vol. 4 Issue 4, p281-292, 12p
Autor:
Iwasokun Gabriel Babatunde
Publikováno v:
International Journal of Signal Processing, Image Processing and Pattern Recognition. 8:375-388
Biometrics have featured prominently for human verification and identification with fingerprint emerging as the dominant one. The dominance of fingerprint has been established by the continuous emergence of different forms of Automated Fingerprint Id
Publikováno v:
International Journal of Database Theory and Application. 7:159-178
This paper presents a report on the experimental study of the impact of false minutiae on the performance of fingerprint matching systems. A 3-tier algorithm comprising of preprocessing, minutiae extraction and post-processing stages formed the backb
Publikováno v:
IOSR Journal of Research & Method in Education (IOSRJRME). 4:68-77
Despite the increasing growth in popularity of virtual classrooms and online-learning, some factors which include limited bandwidth for audio and video, poor transmission quality, poor collaborative work and limited feedback during virtual classroom
Publikováno v:
International Journal for Information Security Research. 3:374-382
The computer game framework is an extension of attack graphs based on game theory. It is used for the anticipation and analysis of intruder and administrator concurrent interactions within the network. Like attack-graph-based model checking, the goal