Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
A number of discussions on mortality or survival patterns of under-five children in Nigeria have been presented in the literature over years, most of which were characterized by descriptive analysis, in which facts were reported by... more
    • by 
    •   7  
      GeographyDemographyMedicineLogistic Regression
Information on rate of changes in longitudinal surveys with certain types of population can robustly considered only by Successive sampling in estimate population parameters. Therefore, this study proposed a more efficient estimator... more
    • by 
    •   6  
      MathematicsStatisticsPopulationEfficiency
    • by 
    •   7  
      GeographyDemographyMedicineLogistic Regression
The role of universities as centre of research and diffusion of findings is becoming increasingly important in the 21st century. Higher institute is crucial to long running economic growth because it is the source of knowledge workers and... more
    • by 
    •   4  
      BusinessProductivityInstitutionApplied Science
This research studies the application of hybrid algorithms for predicting the prices of crude oil. Brent crude oil price data and hybrid intelligent algorithm (time delay neural network, probabilistic neural network, and fuzzy logic) were... more
    • by 
    •   9  
      Computer ScienceEconomicsPetroleumProbabilistic Logic
As most of human activities are being moved to cyberspace, phishers and other cybercriminals are making the cyberspace unsafe by causing serious risks to users and businesses as well as threatening global security and economy. Nowadays,... more
    • by 
The increase use of cloud computing infrastructure has led to a security consciousness by users and cloud service providers to protect data available in the cloud from illegal users. Even though, different techniques have been proposed by... more
    • by 
The efficiency of Internet services is determined by the Cloud computing process. Various challenges in computing are being faced, such as security, the efficient allocation of resources, which in turn results in the waste of resources.... more
    • by 
    •   4  
      Computer ScienceDistributed ComputingCloud ComputingCloudSim
Information and communication technologies (ICT) have become commonplace entities in all aspects of life. Across the past twenty years the use of ICT has fundamentally changed the practices and procedures of nearly all forms of endeavour... more
    • by 
    •   6  
      BusinessCorporate GovernanceCloud ComputingDelegation
The idea of integrating SDH/SONET with WDM network technology in a multilayer dynamic network has proven to be reliable alternative for changing from static to automatic switched transport network (ASTN) together with a dynamic photonic... more
    • by 
Task scheduling in fog computing is one of the areas where researchers are having challenges as the demand grows for the use of internet of things (IoT) to access cloud computing resources. Many resource scheduling and optimization... more
    • by 
    • by 
    •   9  
      Computer ScienceInformation TechnologyTechnologyMachine Learning
This paper uses a power transformation approach to introduce a three-parameter probability distribution which gives another extension of the Gompertz distribution known as "Power Gompertz distribution". The statistical features of the... more
    • by  and +2
    •   3  
      Survival AnalysisProbability and Mathematical StatisticsParameter estimation
the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and combat every new form of cyber threat in the cyber security industry. With the increasing digital presence, there is a large amount of... more
    • by  and +3
the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and combat every new form of cyber threat in the cyber security industry. With the increasing digital presence, there is a large amount of... more
    • by  and +1
the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and combat every new form of cyber threat in the cyber security industry. With the increasing digital presence, there is a large amount of... more
    • by  and +2
    •   9  
      Artificial IntelligenceMobile LearningMachine LearningQuantum Information
The adverse impact caused by ransomware on computing systems poses a major threat to everyday users and society in general. With continuous growth in ransomware, and newer malicious families emerging every month, the need for strong... more
    • by  and +3
    • Artificial Intelligence
the rise in cyber attacks has overwhelmed the monetary resources and human ability to analyze and combat every new form of cyber threat in the cyber security industry. With the increasing digital presence, there is a large amount of... more
    • by 
    •   10  
      Computer ScienceArtificial IntelligenceMobile LearningMachine Learning
Internet of Things (IoT) devices generates a huge volume of data that needs to be processed at real time. Cloud computing paradigm has been a requisite part of this process, consequently, the physical distance between users and cloud... more
    • by 
    •   2  
      Computer SecurityDeep Learning
    • by 
    •   5  
      Computer ScienceComputer SecurityDeep LearningEngineering Technology