Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Victor O. Waziri"'
Publikováno v:
Journal of Reliable Intelligent Environments. 8:397-414
Over the years, digital signature algorithms such as Rivest–Shamir–Adleman (RSA) and elliptic curve digital signature algorithm (ECDSA) are the commonly used algorithms to secure data in the public key infrastructure and other computing devices.
Autor:
Victor O. Waziri, Danladi Hakimi
Publikováno v:
International Journal of Computing and Optimization. 1:113-123
This paper uses iterative method for replacement and maintenance policies leading to a very efficient model in large systems unlike the existing exhaustive enumeration algorithm which can be used only if the number of stationary policies is reasonabl
Autor:
John K. Alhassan, Agbejule Gbolahan, Ismaila Idris, N.A. Shafi', i Muhammad Abdulhamid, Victor O. Waziri
Publikováno v:
International Journal of Digital Enterprise Technology. 1:79
Autor:
Agbejule Gbolahan, Ismaila Idris, Shafi’i Muhammad Abdulhamid, Victor O. Waziri, John K. Alhassan
Publikováno v:
International Journal of Digital Enterprise Technology. 1:79
In recent past, there are a lot of research advancements in mobile forensics tools. This is so due to increase usage of mobile phones in storage of information, law enforcement, mobile online trans...
Publikováno v:
Journal of Statistics and Management Systems. 11:675-696
This paper makes a long-term prediction of the sensor nodes network over some information seeking research in some randomly localized environment with the application of the Bayesian and Gaussian processes models. These properties may include life sp
Autor:
Victor O. WAZIRI, Sunday A. REJU
Publikováno v:
Leonardo Journal of Sciences, Vol 6, Iss 11, Pp 109-112 (2007)
This paper constructs the penalty cost functional for optimizing the one-dimensional energized wave control operator. In some multiplier methods such as the Lagrange multipliers and Conjugate Gradient Method (CGM), the cost of augmenting the dynamica
Autor:
Muhammad Bashir Abdullahi, Abubakar S. Magaji, Ojeniyi J. Adebayo, Audu Isah, Victor O. Waziri, Hakimi Danladi
Publikováno v:
Network and Communication Technologies. 2
This paper researches on cloud computing based-on authentication for the security verification using Elliptic Curve Digital Signature Algorithm (ECDSA). The study structure simply focuses on the communication interaction of the Cloud providing commun