Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   3  
      Computer ScienceWireless CommunicationsThe Internet
    • by 
    •   3  
      Computer ScienceComputer ProgrammingComputer Programmming
    • by 
    •   3  
      Computer ScienceModeling and SimulationComputer Programming
    • by  and +1
    •   3  
      Computer Science.net Technologies (c#.net , vb.net, etc)Web Programming
As technology advance daily, attacks on computer system and computer applications are becoming tremendous and increasingly numerous and sophisticated. Thus, e-commerce is threatened due to negative use of technology. The good news is... more
    • by 
    •   4  
      Computer ScienceBiometricsEcommerceData Security
In the context of spaceflight, a satellite is an object which has been placed into orbit by human endeavour. Satellites are sometimes called artificial satellites in order to distinguish them from natural satellites such as the Moon which... more
    • by 
    •   5  
      Computer ScienceCommunicationSatellite CommunicationsComputer Security
    • by  and +1
    •   4  
      Computer ScienceAutomatic Control.net Technologies (c#.net , vb.net, etc)Programming
Climate shocks are more on the way. We have already spewed so much carbon into the atmosphere arising from the way we use energy (oil exploration, gas flaring and fuel combustion from transportation, industrial and mechanical equipments),... more
    • by 
    •   5  
      Climate ChangeEcosystem ServicesClimate Change AdaptationAgricultural Economics
With the risen quest for the acquisition of knowledge, the edge cutting technological advancement of this era has a magnified role to play. The availability of the internet all over the world though a negligible not connected yet, online... more
    • by 
    •   5  
      Software EngineeringMobile learning and eLearningElearning and Distance Learning EductaionElearning Systems
Where there is no archive civilization has no memory and no mechanism to learn from its successes and failures. Knowledge is on the decrease due to the unpleasant nature of manual archive among other reasons. The antidote to this... more
    • by  and +1
    •   4  
      Software EngineeringWeb DesignDigital ArchivesWeb Programming
The advancement of technology and the rapid implementation of advanced technology have made many physical walls and boundaries of insignificant effect. Online E-Library (Electronic Library) is a wall breaking and boundaries cutting... more
    • by  and +1
    •   5  
      Software EngineeringLibrary ScienceDigital LibraryElibrary
When a person is diagnosed with leukaemia. There will be need for blood. If a person has sickle cell disease. He or she needs blood on a regular basis. When a relative of ours needs open heart surgery. He will need blood. While nobody... more
    • by 
    •   5  
      Software EngineeringBlood BankingBlood Bank Information SystemsBlood Bank Management System
The rapid development of internet technologies alongside the technological advancement in information and communication technology have made malware a major cyber threat at the moment. Malwares are software or files that cause harm to the... more
    • by 
    •   6  
      HeuristicsMalware AnalysisCybersecurityHacking
Certificate Authority (CA) has played a major role in our modern digital economy. Most businesses using the internet rely on trusted third party. It can be a mobile banking App platform telling us that transaction is secured; it can be a... more
    • by  and +1
    •   11  
      Artificial IntelligencePrivacyTrustInternet of Things (IoT)
Over the years, millions of data and information in transit have been abused, compromised or lost to cybercriminals/hackers due to inefficient security measures adopted during data transmission. To address this issue this paper reviewed... more
    • by 
    •   6  
      Information SecurityEmbedded SoftwareCryptographyEncryption
This research introduces a hybrid model for image encryption using pixel scrambling technique and chaotic function. The recent increase in multimedia hacking using brute force attack resulting from the use of weak/inadequate cipher keys... more
    • by 
    •   6  
      Genetic AlgorithmsChaotic cryptographyEncryptionData Security
    • by 
    • by 
    • by 
    •   6  
      Information SystemsComputer ScienceInformation TechnologyComputer Engineering
Aging and estrogen-deprivation induce deleterious effects on body composition and vascular function in females. On the other hand, growth hormone (GH), whose production is reduced by age, exerts several vascular effects. The aim of this... more
    • by 
    •   22  
      AgingGrowth HormoneHuman Growth HormoneBiogerontology