Mary Agoyi

Orcid: 0000-0002-2770-1726

According to our database1, Mary Agoyi authored at least 13 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Examining factors influencing e-learning engagement among university students during covid-19 pandemic: a mediating role of "learning persistence".
Interact. Learn. Environ., December, 2023

Avoid Suspicious Route of Blackhole Nodes in MANET's: Using A Cooperative Trapping.
Comput. Syst. Sci. Eng., 2023

2021
Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis.
PeerJ Comput. Sci., 2021

A Hybrid Wormhole Attack Detection in Mobile Ad-Hoc Network (MANET).
IEEE Access, 2021

2020
A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks.
ISC Int. J. Inf. Secur., 2020

Integrating Digital Innovation Capabilities Towards Value Creation: A Conceptual View.
Int. J. Intell. Inf. Technol., 2020

Assessing Faculty's Use of Social Network Tools in Libyan Higher Education via a Technology Acceptance Model.
IEEE Access, 2020

2017
Hybrid technique for robust image watermarking using discrete time fourier transform.
Proceedings of the 25th Signal Processing and Communications Applications Conference, 2017

2016
Robust non-blind color video watermarking using QR decomposition and entropy analysis.
J. Vis. Commun. Image Represent., 2016

2015
A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition.
Signal Image Video Process., 2015

Robust grayscale watermarking technique based on face detection.
Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015

2012
A Multimedia Watermark scheme based on double density dual-Tree discrete wavelet transform and singular value decomposition.
Proceedings of the 20th Signal Processing and Communications Applications Conference, 2012

2011
The use of SMS encrypted message to secure automatic teller machine.
Proceedings of the First World Conference on Information Technology, 2011


  Loading...