Background. Chemotherapy plays a crucial role in malaria control. However, the main obstacle to treatment has been the rise of parasite resistance to most antimalarial drugs …
F Wabwoba, FM Mwakondo - Journal of Information Technology …, 2011 - learntechlib.org
Abstract Every year, the Joint Admission Board (JAB) is tasked to determine those students who are expected to join various Kenyan public universities under the government …
Nowadays service composition has been received lots of attentions considering the fact that no single service can satisfy users' desires in the majority of service oriented scenarios. In …
AA Adamu, AO Salau, L Zhiyong - Internet of Things, 2021 - api.taylorfrancis.com
Access control (AC) in healthcare systems is a growing concern in healthcare informatics, which has received a lot of attention over the past decade. However, not much progress has …
Insider attack and espionage on computer-based information is a major problem for business organizations and governments. Knowledge Management Systems (KMSs) are not …
SA Khan, W Khan, D Pandey - Cloud-Based Big Data Analytics in …, 2021 - igi-global.com
Security threats evaluation accepts a pivotal part in network security management. In this chapter, the author has depicted the significant measures and parameters with respect to …
Machine learning techniques have proved in time past to be very efficient in predicting phenomena with non-linear relationships. Based on the fact that Artificial Neural Networks …
Enterprise networks are integral components of most modern day businesses especially in today's high technology environment. The smart environment created by enterprise networks …
We live in the information age, and personal information has become one of the most valuable resources. This includes personal data (eg date of birth, address, age, gender etc.) …