XIV.1-09 (AbdulRaheem Muyideen, Tomori R. A., Jimoh R. G., Salimonu I. R.) Authentication and Authorization Control in Computational Grid Environment using Fingerprint Minutiae Feature and Attribute Based Access Control
XIV.2-13 (» Salimonu, I. R., Jimoh, R. G., AbdulRaheem, Muyideen and Tomori, R. A.) An Empirical Investigation of the Moderating Effects of Work Experience and Position on the E-voting Adoption
XIV.2-19 (Akinbowale N. Babatunde, Rasheed G.Jimoh, Kazeem A. Gbolagade) An Algorithm for a Residue Number System based Video Encryption System
XVI.1-05 (Isah Olawale Mustapha, Stephen Olabiyisi, Rasheed Gbenga Jimoh, Maruf Olasunkanmi Alimi) Performance Evaluation of Implementation Languages on Cognitive Complexity of Dijkstra Algorithm
XVI.1-06 (Rasheed G. Jimoh, Ridwan M. Yusuf, Yusuf O. Olatunde, Yakub Saheed) Application Of Dimensionality Reduction On Classification Of Colon Cancer Using Ica And K-Nn Algorithm
XVI.2-10 (Abdullahi Yola Musa, Rasheed G. Jimoh) Usuability Evaluation of Twitter Micro-Blog using Heuristic Approach
|