| 1. | Honey Algorithm for Securing and Identifying Hackers in a Pervasive Environment | |
| Pages 2-9 | ||
| Yusuf, Musa; FAKI, Ageebee Silas; Adelaiy e; Ishaya Oluwasegun | ||
| 2. | Project-based Iterative Teaching Model for Introductory Programming Course | |
| Pages 10-41 | ||
| Shahid, Maida; Pervaiz, Kashmala; Hassan, Awais; Khurshid, Khaldoon | ||
| 3. | Intelligent Traffic Management Systems: A review | |
| Pages 42-56 | ||
| Hesham. A. Sakr; Magda I. El-Afifi; plvar team | ||
| 4. | Investigating the Role and Acceptability of Internet of Things in Energy Conservation in Nigeria | |
| Pages 57-72 | ||
| AdamuSulaiman Usman; Musa Yusuf; Ogwueleka Francisca Nonyelum | ||
| 5. | Investigating the Role and Acceptability of the Internet of Things in Energy Conservation in Nigeria | |
| Adamu Sulaiman Usman; Musa Yusuf; Ogwueleka Francisca Nonyelum | ||