Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Kazeem, Idowu"'
Publikováno v:
SSRN Electronic Journal.
Publikováno v:
Therapeutic innovationregulatory science. 49(1)
Dissemination of full-article references in connection with medical information responses from pharmaceutical industry medical information departments (PIMID) has both copyright and Physician Payments Sunshine Act (PPSA) compliance requirements. A co
Publikováno v:
Advances in Nature-Inspired Computing and Applications ISBN: 9783319964508
Membrane computing (MC) is a versatile, nondeterministic, and maximally parallel computing model. We explore the advantages of MC parallelism to flag intrusive connection records in a set of network traffic using a graphic processing unit (GPU) that
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::49941e2d055c8f92992d0bead8f42d8f
https://doi.org/10.1007/978-3-319-96451-5_11
https://doi.org/10.1007/978-3-319-96451-5_11
Publikováno v:
Therapeutic Innovation & Regulatory Science. 49:36-44
Dissemination of full-article references in connection with medical information responses from pharmaceutical industry medical information departments (PIMID) has both copyright and Physician Payments Sunshine Act (PPSA) compliance requirements. A co
Publikováno v:
Therapeutic Innovation & Regulatory Science. 48:155-161
Unsolicited inquiries for off-label medical/product information are the focus of compliance monitoring programs as described in regulatory guidance published by the US Office of the Inspector General (OIG) and the US Food and Drug Administration (FDA
Publikováno v:
Bio-inspired Computing – Theories and Applications ISBN: 9789811036101
BIC-TA (1)
BIC-TA (1)
Several activities take place within a network environment which include (but not restricted to) movement of traffics (packets) among the nodes. An Intrusion Detection system (IDS) which is primarily concerned with the monitoring of an information sy
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ddc3e486727acc87c5b61dbc0f69a605
https://doi.org/10.1007/978-981-10-3611-8_27
https://doi.org/10.1007/978-981-10-3611-8_27
Publikováno v:
2015 International Conference on Electrical Engineering and Informatics (ICEEI).
Investigating the existing approaches of tackling various network security challenges can never be totally exhausted because a perfect and completely secured system is yet unborn! Hence by so doing, their weaknesses would be highlighted with a view t
Publikováno v:
Asian Conference on Membrane Computing ACMC 2014.
Membrane Computing (MC) with its variants has proved to be a versatile class of distributed parallel computing model. This is because despite its infancy, it has enjoyed significant application in various fields. However, much is yet to be accomplish
Publikováno v:
Journal of Networks. 9
Despite the great benefits accruable from the debut of computer and the internet, efforts are constantly being put up by fraudulent and mischievous individuals to compromise the integrity, confidentiality or availability of electronic information sys
Publikováno v:
International Journal of Information and Network Security (IJINS). 2
Spiking Neural P (SN P) System is one of the variants of Membrane computing. SN P system is a parallel computing model which derives its motivation from the biological living cells. On the other hand, ‘Intrusion’ issue has become a major concern