Qualitative assessment of compiled, interpreted and hybrid programming languages AE Kwame, EM Martey, AG Chris Communications on Applied Electronics 7 (7), 8-13, 2017 | 19 | 2017 |
Comparative Analysis of Efficiency of Fibonacci Random Number Generator Algorithm and Gaussian Random Number Generator Algorithm in a Cryptographic System. CAAFOB E.Opoku-Mensah Computer Engineering and Intelligent Systems 4 (10), 50-57, 2013 | 7 | 2013 |
Utilizing Divisible Load Scheduling Theorem in Round Robin Algorithm for Load Balancing In Cloud Environment DT Yeboah, I Odabi, MCAA Abilimi Odabi | 5 | 2016 |
Automatic Biometric Student ttendance System: A Case Study Christian Service University College T Yeboah, IE Opoku-Mensah, CA Abilimi Journal of Engineering, Computers & Applied Sciences 2 (6), 2013 | 5 | 2013 |
Examining the impact of Information and Communication Technology capacity building in High School education in Ghana CA Abilimi, KS Adu-Manu | 2 | 2016 |
Assessing the availability of Information and Communication Technologies in teaching and learning in High School Education in Ghana. CA Abilimi, L Amoako, JN Ayembillah, T Yeboah | 1 | 2016 |
The Imperative Information Security Management System Measures In the Public Sectors of Ghana. A Case Study of the Ghana Audit Service E Opoku-Mensah, AC Abilimi, L Amoako International Journal on Computer Science and Engineering (IJCSE), 760-769, 2013 | 1 | 2013 |
A Proposed Multiple Scan Biometric-Based Registration System for Ghana Electoral Commission T Yeboah, E Opoku-Mensah, C AyaabaAbilimi Journal of Engineering, Computers & Applied Sciences (JEC&AS) 2 (7), 2013 | 1 | 2013 |
Testing for Randomness in Pseudo Random Number Generators Algorithms in a Cryptographic Application. EOMFOB C.A.Abilimi, M.Asante Computer Engineering and Intelligent Systems 6 (9), 12-16, 2017 | | 2017 |
Assessing the challenges of Information and Communication Technology in educational development in High Schools in Ghana. CA Abilimi | | 2016 |
NETWORK MONITORING, MANAGEMENT AND SECURITY SOFTWARE (KAK-BONSU NETWORK WATCHER) K GEORGE, TO BONSU | | 2016 |
HOME SECURITY MONITORING SYSTEM PROJECT (SAMDAN SECURITIES) D KWAKWA-SARPONG | | 2016 |
A KNOWLEDGE-BASED COSMETIC SHOP MANAGEMENT SYSTEM (DERMALOGIC SYSTEM) CASE STUDY: KEVY’S COSMETICS PLAZA, ADUM KUMASI H Amo-Mensah | | 2016 |
Using Adobe Captivate to creative Adaptive Learning Environment to address individual learning styles: A Case study Christian Service University YTA C.A. International Journal of Engineering Research & Technology (IJERT) 2 (11), 2013 | | 2013 |
Comparative Analysis of the Efficiency of Pseudo Random Numbers Generators Algorithms in Cryptographic Application CA Abilimi | | 2012 |
Using Adobe Captivate to creative Adaptive Learning Environment to address individual learning styles: A Case study Christian Service University Dr. Thomas Yeboah, HOD … CA Abilimi | | |
Effective Information Security Management in Enterprise Software Application with the Revest-Shamir-Adleman (RSA) Cryptographic Algorithm AA Christopher | | |
Testing for Randomness in Pseudo Random Number Generators Algorithms in a Cryptographic Application CA Abilimi, M Asante, EO Mensah, FO Boateng | | |
Assessing the Outcome of Information and Communication Technology in Educational Development in Ghana CA Abilimi, K SarpongAdu-Manu, KM Addo, MD Jnr | | |