ARTICLES:
S/N | Paper Title | Paper No |
1. | Lexicon-Based Sentiment Analysis if Web Discussion Posts Using Sentiwordnet B. Muhammad and A. A. Dahiru | 1-11 |
2. | I. Aliyu and M. A Musa | 12-19 |
3. | Set Approximation of Ontologies and Properties A. F. Donfack Kana and B. O. Akinkunmi | 20-30 |
4. | Metaheuristics for Solving Facility Location Optimization Problem B. O. Opesemowo and C. O. Yinka-Banjo | 31-43 |
5. | Enhancing of Informatics Training for Children In Programming Contests Using Scratch Program C. O. Nriagu | 44-53 |
6. | Towards Detecting Credit Card Frauds Using Hidden Markov Model C.O. Tinubu, D.O. Aborisade, A.S. Sodiya, S.A. Onashoga and M.A. Ganiyu | 54-63 |
7. | Evaluation of Computing Resources Consumption of Selected Symmetric-Key Algorithms S. A. Ajagbe, A. O. Adesina, T. J. Odule, and O. Aiyeniko | 64-76 |
8. | SMS-Based Voting System for Crisis Prone Areas in Nigeria C. E. Madubuike, A. C. Onuora, C. I. Eguzo and M. C. Okoronkwo | 77-83 |
9. | Survey of Big Data Programming Frameworks T. Moses and H. C. Inyiama | 84-98 |
10. | Etemi Joshua Garba, Gregory Maksha Wajiga and Asabe Sandra Ahmadu | 99-110 |
11. | Software Process Ontology: Harvest, Formal Representation and Verification Oveh, R.O and Egbokhare, F.A. | 111-120 |
12. | Towards Cloud Energy Metering System With 32 Bit FPGA Device Architecture K. C. Okafor, A. A. Obayi and O. U. Oparaku | 121-133 |
13. | Employing Differential Privacy for Big Data Security Akinwunmi, O.O, Onashoga, S. A. and Folorunso. O. | 134-143 |
14. | O. C. Abikoye, T. O. Aro and I. O. Shoyemi | 144-157 |
15. | Stemming Anomaly Propagation in Software Systems Using Ontology Tajudeen Adeniji Adetunji, Olusegun Folorunso, Olufunke Rebecca Vincent, Olaniyi Mathew Olayiwola | 158-176 |