View CoRI 2016 Proceedings in CEUR-WS
Proceedings index:
- Preface
- YorCALL: Improving and sustaining Yoruba Language through a practical Iterative learning Approach1-5
Zainab Abdulkareem, Emmanuel E. Effiong - A Fundamental Approach to Oil and Gas Leaks Detection6-9
Georgewill M. Onengiye, Igulu K. Theophilus, Japheth R. Bunakiye - Modelling the Multi-Layer Artificial Neural Network for Internet Traffic Forecasting: The Model Selection Design Issues10-16
Mba Odim, Jacob Gbadeyan, Joseph Sadiku - Assessment of the Impact of Social Networking Media on Students’ Academic Performance in Higher Institutions: A case Study of Federal Polytechnic, Ilaro17-21
Jumoke Soyemi, Jamiu Olasina - Analytic Study of Fuzzy-based model for Software Cost Estimation22-30
John Chibuike Nwaiwu, Samuel Adebayo Oluwadare - Digital Right Management in Internet Communication and Information Transfer31-39
Francisca Ogwueleka , Aniche Delight Aniche - A Model for Prediction of Kidney Cancer Using Data Analytic Technique40-45
Felix Aranuwa, Olanike Ogundare, Sellappan Palaniappan - A Space-Diversity Technique for Mitigating Signal Fading in Radio Transmission46-52
Gerald Ijemaru, Olaitan Akinsanmi, Gbenga Obikoya - Towards Efficient model for Automatic Text Summarization53-57
Yetunde Folajimi, Tijesuni Obereke - Investigating the Effect of Uniform Random Distribution of Nodes in Wireless Sensor Networks using an Epidemic Worm Model58-63
Chukwunonso Nwokoye, Rita Orji, Njideka Mbeledeogu, Ikechukwu Umeh - Diagnostic and Therapeutic Model for Real Time Management of Diabetes64-70
A. E. Babalola, O. M. Omisore, B. A. Ojokoh - “Were We Ready in the First Place?”: An Analysis of Cashless Policy Implementation in Nigeria71-78
Oluwfemi Osho, Temidayo Helen Ajisola, Agada David Onoja, Joel Nnamdi Ugwu - Comparing Research outputs of Nigeria Federal Universities Based on the Scopus Database79-84
Bashir S Galadanci, Maryam I Mukhtar, Sanah Abdullahi Muaz - Evaluation of Computer and Network Security Strategies: A Case Study of Nigerian Banks85-90
Zacheus O. Ogunwobi, Sakinat O. Folorunso, Omobolade Alebiosu - Privacy Preserving Association Rule Mining Using Perturbation Technique91-95
Tobi Omoyele, Solomon Akinola - Optimizing Authorship Profiling of Online Messages96-103
Adeola Opesade - Implementation of Audio Compression using Wavelet104-107
Hauwa Talatu Abdulkarim, Tijjani S Abdulrahman, Abubakar Sadiq Mohammed - Development of a Modified Local Binary Pattern-Gabor Wavelet Transform Aging Invariant Face Recognition System108-114
Oloyede Ayodele, Fagbola Temitayo, Stephen Olabiyisi, Elijah Omidiora, John Oladosu - Likelihood Asymptotics for Changepoint Problem115-121
K. O. Obisesan - Anti-Phishing Research: The Journey so Far122-128
Abdul A Orunsolu, A.S Sodiya - Consumer Verification System for Authentic Product: Case Study of Manufactured Product129-135
John Oladosu, Damilola Taiwo, Christopher Akinwale Oyeleye - Framework for a Cloud Based Health Monitoring System136-140
A. B. Adeyemo, W. O. Adesanya, O. Ariyo - Massive Open Online Courses: A Success of Cloud Computing in Education141-151
Abdulrasheed Mustapha, Shamsuddeen Hassan Muhammad, Saheed Abdullahi Salahudeen - Impact of Passive Cell (PC) and Active Distributive Network Cell (ADNC) on Power System Oscillation152-159
John Oladosu, Abdrazak Olawoye - A study of SOM clustering software implementations160-168
A. B. Adeyemo - E-Commerce in Nigeria: A Survey of Security Awareness of Customers and Factors that Influence Acceptance169-176
Oluwfemi Osho, Christopher Iheanyi Onuoha, Joel Nnamdi Ugwu, Adeyinka Adesuyi Falaye - Result Computation for University of Ibadan Statistics Department Using Anonymous Threshold Scheme177-180
Oluwaseun Otekunrin, Patience Emehinola - Towards a Fully Cooperative Multi-Agent Reinforcement Learning based Media Access Control Protocol for Underwater Acoustic Wireless Sensor Networks181-189
Aliyu Ahmed, Jonathan G. Kolo, Mikail O. Olaniyi, James Agajo - Performance Evaluation of 3G internet access190-200
Ayodeji Ajani, Rowani Odum, Muheeb Ahmed - Developing Smart Car Parking System Using Wireless Sensor Networks201-206
Aliyu Ahmed, Gana Kolo, Mikail Olaniyi, Stephven Oyetoro - Career Advisor Expert System Based on Myers Briggs Personality Assessment207-211
Ayodeji Iwayemi, Bolanle F. Oladejo, Damilare S. Adeleke - Redundant Residue Number System Based Fault Tolerant Architecture over Wireless Network212-216
Olabanji Olatunde, Kazeem Gbolagade, Jumoke Ajao - A Design Comparison: Data Warehouse Schema versus Conventional Relational Database Schema217-222
Abdulrahman Yusuf - Mind Analysis Game Using Android Mobile Technology223-226
I.T. Ayorinde, E. A. Erhabor - Modeling an Enhanced Intrusion Detection System Using Mobile Agent: A Methodological Framework227-233
Isah Olawale Mustapha, Rasheed Gbenga Jimoh - Classification of Human Brain Signal for Diagnosis of Stroke Disease Using Artificial Neural Network234-236
Joseph Igwe, Hight Inyiama - A Remedial Pre-Quarantine Perspective to Worm Propagation Defense Modeling for Wireless Sensor Networks Using a Combination of Differential Equation and Agent-Based Approaches237-238
Chukwunonso Nwokoye, Virginia Ejiofor - Implementation of Cross-platform Language between SQL and NoSQL Database Systems239-240
Kenechukwu K. Okeke, Virginia E. Ejiofor