Indexed in:
Google Scholar Crossref ResearchGate Academia.edu
Google Scholar Crossref ResearchGate Academia.edu Google Scholar Crossref ResearchGate Academia.edu

Published Research Papers

Explore our collection of peer-reviewed academic publications

164 Published Papers
Electrical Engineering Feb 28, 2026

Autoclave is a machine used to carry out industrial and scientific processes requiring elevated temperature and pressure in relation to ambient pres...
COMPUTER ENGINEERING Feb 28, 2026

In the world of communication networks, which provide services to a variety of highly demanding applications, effective resource allocation is essenti...
COMPUTER SCIENCE Feb 28, 2026

Pancreatic Cancer (PC) is among the deadliest forms of cancer, with a high mortality rate due to its often-late diagnosis. Early detection plays a cri...
Biomedical Engineering Feb 28, 2026

A microscope from ancient Greek words (mikros) which means “small” and (skopeo) meaning to look at, examine or inspect) in an instrument...
POWER Feb 28, 2026

This study presents the improvement of Nigeria’s 34-bus, 330/132?kV transmission network performance through Flexible AC Transmission System (FACTS)...
Engineering Feb 28, 2026

This paper presents smart link control scheme for wireless networks based on Kalman filter-sliding window controller. The scheme aims at improving the...
Computer Science Feb 28, 2026

The proliferation of 5G networks has revolutionized communication paradigms, introducing unprecedented speeds and connectivity. However, the dense dep...
Electronic and communication Feb 28, 2026

The increasing complexity of cyber threats has made traditional network defence mechanisms inadequate; especially in smart environments handling high-...
Engineering Feb 28, 2026

Adversarial attack is an attack tactics employed by cybercriminals to deceive modern network security systems and penetrate networks for cyber attack....
Engineering Feb 28, 2026

This paper presents a study on improving power transmission system transient stability using the particle swarm optimization (PSO) technique. The rese...
computer science Feb 28, 2026

Fileless malware is a significant cybersecurity threat because of its ability to operate without traditional file-based signatures which makes it chal...
Computer Science Feb 28, 2026

The underutilization of the constrained spectrum by the fixed channel allocation strategy and the increasing demand for seamless wireless services pro...
Showing 1 to 12 of 164 papers

Publish Your Research With Us

Join our community of researchers and share your groundbreaking work with the world.

Submit Your Manuscript

We respect your privacy and never share your information

Loading...