Exploring cybersecurity threats in digital marketing S Konyeha NIPES-Journal of Science and Technology Research 2 (3), 2020 | 24 | 2020 |
An improved token-based umpiring technique for detecting and eliminating selfish nodes in mobile ad-hoc networks K Susan, C Konyeha, AM John-Otumu, ES Mughele Egyptian Computer Science Journal 44 (2), 2020 | 8 | 2020 |
An ontology-driven fashion recommender system for occasion-specific apparels PU Usip, FB Osang, S Konyeha Journal, Advances in Mathematical & Computational Sciences 8 (1), 67-76, 2020 | 5 | 2020 |
Initiatives and role of women scientist forums with mentorship opportunities in STEM S Konyeha, GI Agwam, E Musa, IV Ngonadi, AC Afehomo African Journal of Health, Safety and Environment 2 (2), 89-99, 2021 | 4 | 2021 |
Development of a Web Based Expert System for Rubber Crop Disease Diagnosis and Management S Konyeha, FA Imouokhome Journal of Scientific Research 10 (3), 239-248, 2018 | 4 | 2018 |
Hybridized Optimisation Framework for Routing calls in Call Centres. FTC-2017, Future Technologies Conference, Vancouver, Canada 28-29 November 2017 ES Mughele, CS Chiemeke, S Konyeha, KC Ukaoha, D Akpon-Ebiyomare IEEE Xplore, 2017 | 4 | 2017 |
Konyeha. S (2017a), A Comparative Analysis of Waiting Time Routing Rule for Queue Reduction in Call Center ES Mughele, CS Chiemeke Journal Digital Innovations & Contemporary Research in Science, Engineering …, 0 | 4 | |
Harnessing Deep Learning for Sustainable E-Waste Management and Environmental Health Protection GP Oise, S Konyeha | 3 | 2024 |
Exploring mathematical models to improve routing protocol for call centre ES Mughele, K Susan International Journal of Computer Applications 975, 8887, 2020 | 3 | 2020 |
E-Waste Management through Deep Learning: A Sequential Neural Network Approach G Oise, S Konyeha FUDMA JOURNAL OF SCIENCES 8 (4), 17-24, 2024 | 2 | 2024 |
A novel smart CBT model for detecting impersonators using machine learning technique AM John-Otumu, OC Nwokonkwo, IU Izu-Okpara, OO Dokun, K Susan, ... 2020 IEEE 2nd International Conference on Cyberspac (CYBER NIGERIA), 21-30, 2021 | 2 | 2021 |
Deployment of vanets infrastructure to aid road transport systems in developing countries S Konyeha, E Osa European Journal of Electrical Engineering and Computer Science 4 (6), 2020 | 2 | 2020 |
Computer immunity using an intrusion detection system (IDS) S Konyeha, EA Onibere advanced materials research 824, 200-205, 2013 | 2 | 2013 |
Deep learning system for e-waste management GP Oise, S Konyeha Engineering Proceedings 67 (1), 66, 2024 | 1 | 2024 |
An improved password-authentication model for access control in connected systems C Nwankwo, W Adigwe, W Nwankwo, AE Kizito, S Konyeha, F Uwadia 2022 5th Information Technology for Education and Development (ITED), 1-8, 2022 | 1 | 2022 |
Demonstrating the Impact of 6to4 Tunneling on IPV4 and IPV6 Network Coexistence E Osa, S Konyeha, E Evbuomwan European Journal of Electrical Engineering and Computer Science 4 (5), 2020 | 1 | 2020 |
Security and Quality Assurance of ICT Enhanced Learners Support Services in Distance Education: National Open University Nigeria Experience OO Helen, K Susan NIPES-Journal of Science and Technology Research 2 (3), 2020 | 1 | 2020 |
An Efficient Hybrid Cryptographic Model for Securing Information over Communication Network. S Konyeha, AM John-Otumu Egyptian Computer Science Journal 44 (2), 2020 | 1 | 2020 |
Enhancing Electronic Banking Security in Nigeria Using Finger Vein Biometric D Imanah, S Konyeha International Journal of Computer Science and Software Engineering 6 (5), 120, 2017 | 1 | 2017 |
Design and implementation of a heart rate monitor JA Igimoh, S Konyeha Advanced Materials Research 824, 145-150, 2013 | 1 | 2013 |