关注
Elegbeleye Femi Abiodun
Elegbeleye Femi Abiodun
Walter Sisulu University, Computer Science
在 wsu.ac.za 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Data Privacy on using Four Models- A Review
FA Elegbeleye, M Mbodila, A Mabovana, OA Esan
International Conference on Electrical, Computer and Energy Technologies …, 2022
52022
Surveillance Detection of Anomalous Activities with Optimized Deep Learning Technique in Crowded Scenes
OA Esan, DO Esan, M Mbodila, FA Elegbeleye, K Koranteng
Bulletin of Electrical Engineering and Informatics 12 (3), 1674-1683, 2023
32023
A Novel RFID-Based Design-Theoretical Framework for Combating Police Impersonation
I Bassey, O Ifeoma, FA Elegbeleye
International Journal of Computer Science and Information Security 13 (10), 1, 2015
32015
Cost-effective internet of things privacy-aware data storage and real-time analysis
FA Elegbeleye, M Mbodila, OA Esan, I Elegbeleye
Int J Artif Intell 13 (1), 247-255, 2024
12024
Power Supply Rationing in an Era of E-Learning: Evidence from the Rural University
C Mbaleki, FA Elegbeleye, OA Esan, T Rabotapi
EUREKA: Social and Humanities, 3-12, 2023
12023
IoT Device Cost Effective Storage Architecture and Real-Time Data Analysis/Data Privacy Framework
FA Elegbeleye, S Rananga
International Journal of Industrial and Manufacturing Engineering 17 (7), 11, 2023
12023
Machine Learning Approach to Address SQL Injection Attacks In Web Applications
FA Elegbeleye, M Chris, K Koranteng
PONTE International Journal of Science and Research 78 (6), 2022
12022
Optimization of Network Performance in Complex Environments with Software Defined Networks
M Mbodila, OA Esan, FA Elegbeleye
Journal of Information Systems and Informatics 6 (3), 1723-1742, 2024
2024
Effective Approach to Reduce Patient Long Queues in Hospital Emergency Department
OA Esan, FA Elegbeleye
2024 International Conference on Artificial Intelligence, Big Data …, 2024
2024
RFID-based design-theoretical framework for combating police impersonation in South Africa
I Bassey, N Gasela, O Ifeooma, FA Elegbeleye
2015 Second International Conference on Information Security and Cyber …, 2015
2015
系统目前无法执行此操作,请稍后再试。
文章 1–10