Zobrazeno 1 - 10
of 29
pro vyhledávání: '"S.A. Onashoga"'
Publikováno v:
Revista de Biología Tropical, Vol 55, Iss 3-4, Pp 755-760 (2007)
The study presents an interactive descriptive tool (MONRATE) for calculating and predicting reinfection rates and time of Ascaris lumbricoides following mass chemotherapy. The implementation was based on the theoretical equation published by Hayashi
Externí odkaz:
https://doaj.org/article/7bcb4e4273be4498ad1f069ca647e310
Publikováno v:
Journal of Computing and Information Technology, Vol 27, Iss 2, Pp 29-39 (2019)
Journal of computing and information technology
Volume 27
Issue 2
Journal of computing and information technology
Volume 27
Issue 2
Intrusion Detection Systems (IDSs) are an integral part of an organization's infrastructure. Without an IDS facility in place to monitor network and host activities, attempted and successful intrusion attempts may go unnoticed. This study proposed a
Publikováno v:
International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020) ISBN: 9783030802158
With the openness and growing popularity of Android Operating system all over the world, it has become a target of attack for Malware authors who are determined to take advantage of over 2.5 billion monthly active users of Android devices. Despite Go
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d8e2183b28d52b415473d975b37511a8
https://doi.org/10.1007/978-3-030-80216-5_12
https://doi.org/10.1007/978-3-030-80216-5_12
Publikováno v:
2020 International Conference in Mathematics, Computer Engineering and Computer Science (ICMCECS).
Medical diagnosis is a complicated task and plays a vital role in saving human lives so it needs to be executed accurately and efficiently. An appropriate and accurate computer based automated decision support system is required to reduce cost for ac
Publikováno v:
Journal of Computer Science and Its Application; Vol 26, No 2 (2019); 54-63
E-commerce systems have become increasingly popular due to the widespread of internet shopping and banking. Credit card is one of the mostly used forms of payment on e-commerce platforms. However, there has been a tremendous rise in fraudulent credit
Publikováno v:
Journal of Computer Science and Its Application; Vol 26, No 2 (2019); 134-143
Big data frequently contains huge amounts of personal identifiable information and therefore the protection of user’s privacy becomes a challenge. Lots of researches had been carried out on securing big data, but still limited in efficient privacy
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Issues in Informing Science and Information Technology, Vol 6, Pp 669-682 (2009)
Introduction An intrusion is defined as any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. An intrusion takes place when an attacker or group of attackers exploit security vulnerabilities and t
Publikováno v:
ICSEng
Many ICT-based systems used in managing antenatal care are still faced with the problems of inaccessibility, lack of effective consultations and low usability. This paper proposes an architecture, a Mobile Phone-Based Antenatal Care Support System (M
Publikováno v:
ITNG
The constant development in computer technology now gives rise to an efficient way of using computer or electronic medium of voting. However, it is being faced with the problem of non-anonymity, coercion and bribery. In this paper, elliptic curve is