Automated negotiation for peer-to-peer electricity trading in local energy markets C Etukudor, B Couraud, V Robu, WG Früh, D Flynn, C Okereke Energies 13 (4), 920, 2020 | 79 | 2020 |
Virtualization in cloud computing: Developments and trends I Odun-Ayo, O Ajayi, C Okereke 2017 International Conference on Next Generation Computing and Information …, 2017 | 23 | 2017 |
Design and implementation of an iris biometric door access control system E Noma-Osaghae, O Robert, C Okereke, OJ Okesola, K Okokpujie 2017 International conference on computational science and computational …, 2017 | 21 | 2017 |
Integration of iris biometrics in automated teller machines for enhanced user authentication K Okokpujie, E Noma-Osaghae, O Okesola, O Omoruyi, C Okereke, ... Information Science and Applications 2018: ICISA 2018, 219-228, 2019 | 20 | 2019 |
Design and implementation of an iris biometric door access control system NO Etinosa, C Okereke, O Robert, OJ Okesola, KO Okokpujie Computational science and computational intelligence (CSCI), 2017 | 16 | 2017 |
Evaluation of the quality of an image encrytion scheme O Omoruyi, C Okereke, K Okokpujie, E Noma-Osaghae, O Okoyeigbo, ... TELKOMNIKA (Telecommunication Computing Electronics and Control) 17 (6 …, 2019 | 14 | 2019 |
Fingerprint biometric authentication based point of sale terminal K Okokpujie, E Noma-Osaghae, O Okesola, O Omoruyi, C Okereke, ... Information Science and Applications 2018: ICISA 2018, 229-237, 2019 | 14 | 2019 |
An overview of machine learning techniques in local path planning for autonomous underwater vehicles CE Okereke, MM Mohamad, NHA Wahab, O Elijah, A Al-Nahari IEEE Access 11, 24894-24907, 2023 | 12 | 2023 |
Microsleep accident prevention for smart vehicle via image processing integrated with artificial intelligent SH Zaleha, NHA Wahab, N Ithnin, J Ahmad, NH Zakaria, C Okereke, ... Journal of Physics: Conference Series 2129 (1), 012082, 2021 | 11 | 2021 |
Design and Implemenation of a Unified e-ID Card for Secure e-Voting System (MUSES) SN John, CK Ayo, C Ndujuiba, CE Okereke International Journal of Computer and Information Technology 2 (06), 1131-1135, 2013 | 10 | 2013 |
Autonomous Underwater Vehicle in Internet of Underwater Things: A Survey C Okereke, NHA Wahab, MM Mohamad, SH Zaleha Journal of Physics: Conference Series 2129 (1), 012080, 2021 | 9 | 2021 |
Automated negotiation for peer-to-peer trading of renewable energy in off-grid communities C Etukudor, V Robu, B Couraud, G Kocher, WG Früh, D Flynn, C Okereke 2019 IEEE PES/IAS PowerAfrica, 1-6, 2019 | 8 | 2019 |
Development of an Encrypting System for an Image Viewer based on Hill Cipher Algorithm O Chinonso, O Omoruyi, K Okokpujie, S John Covenant Journal of Engineering Technology, 2017 | 8 | 2017 |
A review of machine learning path planning algorithms for autonomous underwater vehicles (auv) in internet of under-water things (iout) C Okereke, N Haliza, A Wahab, M Murtadha Proc. 12th Int. Conf. Internet (ICONI), 1-6, 2020 | 6 | 2020 |
Cloud and application programming interface–Issues and developments I Odun-Ayo, C Okereke, H Orovwode Proceedings of the World Congress on Engineering 1, 2018 | 6 | 2018 |
Wireless sensor network for rainfall measurement using a tipping bucket rain gauge mechanism O Omoruyi, SN John, O Chinonso, O Robert, AA Adewale, KO Okokpujie 2017 International Conference on Computational Science and Computational …, 2017 | 4 | 2017 |
Vehicle collision avoidance system using localization algorithm and predictive analysis SN John, E Noma-Osaghae, K Okokpujie, C Okereke, J Ananaba, ... 2019 International Conference on Computational Science and Computational …, 2019 | 3 | 2019 |
Cloud Application Portability: Issues and Developments I Odun-Ayo, C Okereke, H Orovwode Cloud Computing-Technology and Practices, 2018 | 3 | 2018 |
Creating a policy based network intrusion detection system using java platform SN John, CU Ndujiuba, RE Okonigene, CE Okereke, ME Wakama Proceedings of the International Conference on Security and Management (SAM), 1, 2014 | 3 | 2014 |
Mitigating threats in a corporate network with a taintcheck-enabled honeypot SN John, OA Albert, K Okokpujie, E Noma-Osaghae, O Osemwegie, ... Information Science and Applications: ICISA 2019, 73-83, 2020 | 2 | 2020 |