Logo
  • Home
  • About NCS
  • Publications
    • Journal of Computer Science and Its Applications
    • Journal of Information Security, Privacy and Digital Forensics
    • Conference Proceedings
    • Technical Reports
    • Downloads
  • Journal Subscription
  • Home
  • About NCS
  • Publications
    • Journal of Computer Science and Its Applications
    • Journal of Information Security, Privacy and Digital Forensics
    • Conference Proceedings
    • Technical Reports
    • Downloads
  • Journal Subscription
Logo
  • Home
  • About NCS
  • Publications
    • Journal of Computer Science and Its Applications
    • Journal of Information Security, Privacy and Digital Forensics
    • Conference Proceedings
    • Technical Reports
    • Downloads
  • Journal Subscription

Category: JCSA

Home / Category: JCSA
Icon

A MODEL-BASED COLLABORATIVE FILTERING WITH DIMENSIONALITY REDUCTION

1 file(s) 375.35 KB
JCSA/V24N2/DECEMBER2017/05
Icon

DESIGN AND IMPLEMENTATION OF A BIOMETRIC ATTENDANCE SYSTEM USING FACIAL RECOGNITION

1 file(s) 212.95 KB
JCSA/V24N2/DECEMBER2017/04
Icon

CHARACTER RECOGNITION FROM IMAGE USING RADIAL BASIS FUNCTION NEURAL

1 file(s) 497.48 KB
JCSA/V24N2/DECEMBER2017/03
Icon

SIMPLIFIED COOLEY-TUKEY NUMERICAL FAST FOURIER TRANSFORMS ALGORITHM FOR DIGITAL SIGNAL PROCESSING

1 file(s) 336.47 KB
JCSA/V24N2/DECEMBER2017/02
Icon

ALGORITHM DEVELOPMENT SIMULATOR FOR HUMAN HEART BEAT RATE

1 file(s) 287.45 KB
JCSA/V24N2/DECEMBER2017/01
Icon

An Information Technology (IT) Equipment Fault Prediction System for an IT Support Unit

1 file(s) 448.50 KB
JCSA/V25N1/JUNE2018/14
Icon

MEPLN E-Learning: Mesh-Based Peer-to-Peer Collaborative E-Learning System for Limited Capacity Networks

1 file(s) 717.61 KB
JCSA/V25N1/JUNE2018/13
Icon

Optimized Model for Comparing Two Intrusion Logs

1 file(s) 543.27 KB
JCSA/V25N1/JUNE2018/12
Icon

Time Series Prediction Using Artificial Neural Network

1 file(s) 609.56 KB
JCSA/V25N1/JUNE2018/11
Icon

A Promethee Based Evaluation of Software Defect Predictors

1 file(s) 267.41 KB
JCSA/V25N1/JUNE2018/10
Icon

UGMAP: A Web and Mobile Application for Navigation and Notification: The University Of Ghana, Legon Campus

1 file(s) 1.01 MB
JCSA/V25N1/JUNE2018/09
Icon

Evaluating Industrial Control System (ICS) Security Vulnerability Through Functional Dependency Analysis

1 file(s) 32.00 KB
JCSA/V25N1/JUNE2018/08
Icon

Naijaspell: Spellchecking for Nigerian Pidgin

1 file(s) 342.65 KB
JCSA/V25N1/JUNE2018/07
Icon

E-IASAODV: An Enhanced Framework For Preventing Ad-Hoc On-Demand Distance Vector (AODV) Multiple Black Hole Attack in MANET

1 file(s) 392.37 KB
JCSA/V25N1/JUNE2018/06
Icon

Face Detection System for Students Attendance Using Principal Component Analysis (PCA)

1 file(s) 686.81 KB
JCSA/V25N1/JUNE2018/05
  • 1
  • 2
  • …
  • 12
  • 13
  • 14
  • 15
Copyright © 2020 Nigeria Computer Society. All Rights Reserved
  • Follow us