1 | Honey Algorithm for Securing and Identifying Hackers in a Pervasive Environment | |
Page 2-9 | ||
Yusuf, Musa; FAKI, Ageebee Silas; Adelaiy e; Ishaya Oluwasegun | ||
2 | Project-based Iterative Teaching Model for Introductory Programming Course | |
Page 10-41 | ||
Shahid, Maida; Pervaiz, Kashmala; Hassan, Awais; Khurshid, Khaldoon | ||
3 | Intelligent Traffic Management Systems: A review | |
Page 42-56 | ||
Hesham. A. Sakr; Magda I. El-Afifi; plvar team | ||
4 | Investigating the Role and Acceptability of Internet of Things in Energy Conservation in Nigeria | |
Page 57-72 | ||
AdamuSulaiman Usman; Musa Yusuf; Ogwueleka Francisca Nonyelum | ||
5 | Investigating the Role and Acceptability of the Internet of Things in Energy Conservation in Nigeria | |
Adamu Sulaiman Usman; Musa Yusuf; Ogwueleka Francisca Nonyelum | ||