Staff Profile / Publication Repository

Demonstrate your scholarly/professional recognition to your institution

LATEST PUBLICATIONS

ALL PUBLICATIONS

An assessment of the usage of project evaluation techniques in some selected Nigerian industries

Journal: Journal of Social Management Sciences , 1998
Author: UMEMEZIA, F.O. and IBHADODE, A.O.A

Performance Evaluation of an Indigenous Rotary Power Weeder

Journal: Energy and Environmental Engineering Journal, 2012
Author: Olaoye, J. O. and Samuel, O. D. and Adekanye, T. A

Geostatistical Analysis of well Velocity Data for Enhanced Depth Imaging in the Niger Delta

Journal: Journal of Applied Geology and Geophysics, 2017
Author: G. I. Alaminiokuma and W. N. Ofuyah

Phytosynthesis of silver nanoparticles using aqueous leaf extracts of Lippia citriodora: Antimicrobi ...

Journal: MSEC, 2017
Author: Elias E. Elemike, Damian C. Onwudiwe, Anthony C. Ekennia, Richard C. Ehiri, Nnaemeka J. Nnaji

Comparative Stochastic Study for Credit-Card Fraud Detection Models

Journal: IEEE African Journal of Computing ICT, 2015
Author: Ojugo, A. A., Oyemade, D. A., Allenotor, D., Longe, O. E., Anujeonye, C.

The Spatial Assessment of Wastes Collection Points Using GIS Approach.

Journal: The Nigerian Journal of Cartography and GIS., 2013
Author: Onosemuode C. Ajayi O. Ayodele and Esemedade J. U

Towards an Enhanced Product Line Engineering Process Model

Journal: Benin Journal of Advances in Computer Science, 2019
Author: Oyemade, D. A, Onibere, E. A.

An Optimal Investment Returns with N-Step Utility Functions

Journal: Bulletin of Mathematical Sciences and Applications, 2016
Author: EGHWERIDO Joseph Thomas and OBILADE Titilola

Leachate Characterization and Leachate Pollution Index from Landfill Dump Sites in Warri Metropolis, ...

Journal: International Letters of Natural Sciences, 2016
Author: Asibor, G. and Edjere, O.

A Cost-Based Approach for Analysing the Overheads of Multicast Protocols in Non-Strictly Hierarchica ...

Journal: International Journal of Communication Networks and Information Security (IJCNIS), 2011
Author: Akpojaro, J., Aigbe, P., Oyemade, D

VIEW ALL PUBLICATION

TAGS