1. | Honey Algorithm for Securing and Identifying Hackers in a Pervasive Environment | |
Pages 2-9 | ||
Yusuf, Musa; FAKI, Ageebee Silas; Adelaiy e; Ishaya Oluwasegun | ||
2. | Project-based Iterative Teaching Model for Introductory Programming Course | |
Pages 10-41 | ||
Shahid, Maida; Pervaiz, Kashmala; Hassan, Awais; Khurshid, Khaldoon | ||
3. | Intelligent Traffic Management Systems: A review | |
Pages 42-56 | ||
Hesham. A. Sakr; Magda I. El-Afifi; plvar team | ||
4. | Investigating the Role and Acceptability of Internet of Things in Energy Conservation in Nigeria | |
Pages 57-72 | ||
AdamuSulaiman Usman; Musa Yusuf; Ogwueleka Francisca Nonyelum | ||
5. | Investigating the Role and Acceptability of the Internet of Things in Energy Conservation in Nigeria | |
Adamu Sulaiman Usman; Musa Yusuf; Ogwueleka Francisca Nonyelum | ||