-
161
Generative AI, IoT, and blockchain in healthcare: application, issues, and solutions
Published 2025-01-01Get full text
Article -
162
ReHypar: A Recursive Hybrid Chunk Partitioning Method Using NAND-Flash Memory SSD
Published 2014-01-01Get full text
Article -
163
Log-Less Metadata Management on Metadata Server for Parallel File Systems
Published 2014-01-01Get full text
Article -
164
ENVIRONMENTAL TEMPERATURE AND HUMIDITY MONITORING SYSTEM USING RASPBERRY PI 4 AND THINGSPEACK
Published 2022-01-01“…The IoT ThingSpeak platform provides data storage, processing and visualization services. …”
Get full text
Article -
165
INFORMATION TECHNOLOGY ADOPTION IN NIGERIAN LOCAL GOVERNMENT ADMINISTRATION; PERSPECTIVES CHALLENGES AND PROSPECTS
Published 2024-07-01“…Local government administration in Nigeria today is faced with problems of digitalization to cope with modern challenges of the use of computer and other electronic gadgets for effective record keeping, data processing, storage and retrieval of information. …”
Get full text
Article -
166
A Novel Compression Technique for Multi-Camera Nodes through Directional Correlation
Published 2015-06-01Get full text
Article -
167
Assessment of Records Management Practices at Uganda College of Commerce Kabale.
Published 2024“…Proposed solutions included ensuring retention and durability, providing secure storage, offering continuous training programs, acknowledging the diversity of paper and electronic records, maintaining authenticity, proper disposal, and utilizing computer-based management practices. …”
Get full text
Thesis -
168
-
169
Cross-Chain Identity Authentication Method Based on Relay Chain
Published 2025-01-01“…More importantly, comparative analysis and experimental results show that our proposed method achieves lower computational cost, reduced storage cost, lower latency, and higher throughput. …”
Get full text
Article -
170
-
171
A novel aggregated coefficient ranking based feature selection strategy for enhancing the diagnosis of breast cancer classification using machine learning
Published 2025-02-01“…The work implemented the introduced methodology using Wisconsin-based breast cancer data and applied the Synthetic Minority Oversampling Technique (SMOTE) to the obtained data subset. …”
Get full text
Article -
172
Modern Geodata Management: Application of Interdisciplinary Interpretation and Visualization in Central America
Published 2009-01-01“…In the last years new methods of data acquisition and processing in geosciences, inspired by growing computer performance, have led to an increased amount of data, and this development will proceed surely. …”
Get full text
Article -
173
Geographical Peer Matching for P2P Energy Sharing
Published 2025-01-01“…Furthermore, we propose and study analytically and empirically a spectrum of approaches to address it and perform a cost-efficient matching of peers in a computationally efficient fashion. Our experimental study, based on real-world energy data, demonstrates that our proposed solutions are efficient both in terms of cost savings achieved by the peers and in terms of communication and computing requirements. …”
Get full text
Article -
174
A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment
Published 2013-03-01“…Cloud computing provides network based access to computing and data storage services on a pay per usage model. …”
Get full text
Article -
175
-
176
Design and Realization of the Intelligent Design System for Tunnel Blasting in Mine Based on Database
Published 2020-01-01“…The implementation of the new system addresses the needs of blasting data information storage and search and lays a foundation for the informatization and standardization of tunnel excavation blasting.…”
Get full text
Article -
177
The Application of ICT in Reference Service at Kabale University Library.
Published 2023“…Both questionnaires and interview guides were used to collect data. The study findings indicated that information sharing, communication purposes, cataloguing and classification of library materials, issuing in and out of library materials (circulation), storage, retrieval and dissemination of information and e-resources trainings were applications of ICT use for rendering reference services at Kabale University Library. …”
Get full text
Thesis -
178
-
179
Security Enhancement Using Cache Based Reauthentication in WiMAX Based E-Learning System
Published 2015-01-01Get full text
Article -
180