How does economics influence security and privacy?
Given the dynamic developments and innovation in computing, IT and Information Systems Industry, it appears that there is a shortage of well qualified professionals who will push the edge of...
11 December 2019 6,883 5 View
Mathematical model on logistics and supply chain (LSC) plays an important role in the decision-making tool to obtain optimal strategy. An LSC comprises of the upper parts which consist of raw...
09 October 2019 1,138 1 View
Big data analytics (BDA) is a major paradigm shift in business analytics. Big data refers primarily to datasets which are characterized by what some authors term the “three Vs” or volume, variety,...
09 October 2019 2,893 4 View
Albert Schweitzer said “success is not the key to happiness. Happiness is the key to success. If you love what you are doing, you will be successful”. Most organizations believe that the...
06 July 2019 3,120 1 View
Smart manufacturing, sometimes referred to as Industry 4.0, heralds a new age of responsive supply networks and tailored products and services made possible by advanced technologies such as the...
05 June 2019 1,822 2 View
The edge detection takes a wide interest in the field of digital image processing and computer vision, which is one of the basic stages in the process of patterns recognition and image...
04 May 2019 7,344 3 View
Text classification (TC) is a popular technique in the data mining and it used to get valuable information from the vast amount of data. The process of classifying or grouping documents into...
04 May 2019 1,690 3 View
Long Term Evolution (LTE) is the 4th generation broadband technology for mobile. LTE has been developed by 3GPP in release 8 technical specifications (R8). The LTE facilitates QoS to be...
02 March 2019 8,491 2 View
Vertical Handover (VHO) decision algorithm for heterogeneous network architectures which integrate both cellular networks and Wireless Local Area Networks (WLANs). The cellular-WLAN and WLAN-WLAN...
02 March 2019 9,512 1 View
Given the current dynamic developments in Computing, Internet and ICT industry, the Cyber Security has become essential part of curriculum in higher education worldwide. However, there are number...
01 February 2019 6,568 15 View
A Markov-like Model for Patient Progression" Markov Chain Monte Carlo (MCMC) Markov Chain Monte Carlo (MCMC) is a powerful computational technique used to draw samples from a probability...
05 August 2024 10,079 0 View
Dear readers, Thanks for your attention. I am wondering about the health economic problem of quantifying the value of interventions which a) prevent, b) improve symptom profile and c) ultimately...
05 August 2024 3,246 1 View
What should a Mechanical Engineering PhD scholar focus on during their PhD to enhance their chances of securing a postdoctoral position?
29 July 2024 7,714 4 View
What is climate resilience for food security and sustainable agriculture and how is smart irrigation in agriculture climate resilient?
22 July 2024 1,947 0 View
Dear Colleagues, I hope this message finds you well. My name is Noor Al-Huda K. Hussein,and I am a researcher specializing in deep learning applications in genetic data analysis. I am currently...
18 July 2024 5,562 0 View
How can sustainable agriculture practices mitigate climate change and ensure food security and role of agriculture in environmental sustainability?
17 July 2024 1,712 12 View
How can technology contribute to global food security and sustainable agriculture practices contribute to poverty reduction and food security?
17 July 2024 7,745 6 View
I read several information security books. How do I start writing anti-virus softwares ?
13 July 2024 8,180 1 View
The negative impact of Cybercrime in Nigeria
10 July 2024 3,845 2 View
I am pleased to extend an invitation to experts in the fields of Cybersecurity, Computer Science, Computer and Electronics Engineering, Mathematics, and Operations Research to review and provide...
04 July 2024 6,132 0 View