Cloud computing, grid computing, digital forensic, bring your own devices, biometrics technology, internet of things, data mining, data science, big data analytics, software engineering, social networking, smart grid, bioinformatics, intrusion detection, human factor in information security and so on.
Since their introduction, social network sites (SNSs) such as MySpace, Facebook, Cyworld, and Bebo have attracted millions of users, many of whom have integrated these sites into their daily practices. As of this writing, there are hundreds of SNSs, with various technological affordances, supporting a wide range of interests and practices. While their key technological features are fairly consistent, the cultures that emerge around SNSs are varied. Most sites support the maintenance of preexi...
Insecure software is undermining our financial, healthcare, defense, energy, and other critical infrastructure. As our software becomes increasingly complex, and connected, the difficulty of achieving application security increases exponentially. The rapid pace of modern software development processes makes the most common risks essential to discover and resolve quickly and accurately. We can no longer afford to tolerate relatively simple security problems like those presented in this OWASP T...
Threat modelling is an approach for anazlying the security of an application. It is a structured approach that enables you to identify, quantify and address the security risk with an application.
We need tools to facilitate research tasks • Some researchers need special tools indigenous to particular discipline • The concern here is with the general tools of research that the majority of researchers, regardless of discipline and situation, typically need to help carrying out research activities which finally derive meaningful and insightful conclusions from the research. • Be careful not to equate tools of research with the research methodology.
Phlebotomy has been practiced for centuries and is still one of the most common invasive procedures in health care. Each step in the process of phlebotomy affects the quality of the specimen and is thus important for preventing laboratory error, patient injury and even death. For example, the touch of a finger to verify the location of a vein before insertion of the needle increases the chances that a specimen will be contaminated. This causes false blood culture results, prolonged hospitaliz...
Abstract In the current age of the Fourth Industrial Revolution (4IR or Industry 4.0), the digital world has a wealth of data, such as Internet of Things (IoT) data, cybersecurity data, mobile data, business data, social media data, health data, etc. To intelligently analyze these data and develop the corresponding smart and automated applications, the knowledge of artifcial intelligence (AI), particularly, machine learning (ML) is the key. Various types of machine learning algorithms such ...
An Introduction to Deep Learning Building the Intuition How Do Deep Learning algorithms “learn”? So why is it called “Deep” Learning? Conclusions and Takeaways
RootsMagic is one of the best genealogy software. We are certified technicians in RootsMagic Support and also have 10+ years of experience. We provide technical support for genealogy users through call chat and remote.
Every year, soybean yields are reduced by numerous diseases, especially the soybean cyst nematode (SCN). Identifying the presence of SCN and measuring its population densities in the field is challenging as there are no visible signs of disease. The only sure way to evaluate SCN population levels is to extract the cysts from the soil, extract the eggs from the cysts, and count them. Currently, this extraction process is typically done in commercial soil analysis laboratories and university pl...
ABSTRACT The research study was based on examining informatiOn security contrOls in the Human Resource Department of KIU, Uganda. The objectives of the study were; to analyze the information security controls in the Human Resource department of Kampala International University, to explore the extent of compliance to information security objectives at Kampala International University, to investigate the challenges of information security at Kampala International University, and also to ascer...
ABSTRACT The purpose of this study was to investigate community policing as a strategy for upgrading the level of security in Puntland. Hence it’s examined by identifying the level of awareness of the concept of community policing projects in Puntland, investigating the current status of Puntland security and need for community policing projects, and identifying the challenges that may face community policing projects in Puntland. In gathering information the research study employed both ...
ABSTRACT Citizen Identification has always been an issue of importance in the Ugandan society in order to solve problems that lead to delivery of poor health services, inefficient use of resources and failure to meet the people’s basic needs. Due to the accumulated cases of poor management of Citizen Information, the consequences are still being felt. A modern Web-based management information system for Uganda’s Citizens where Citizen Information will be kept and disseminated to stakeho...
ABSTRACT The research study was based on examining information security controls in the Human Resource Department of KIU, Uganda. The objectives of the study were; to analyze the information security controls in the Human Resource department of Kampala International University, to explore the extent of compliance to information security objectives at Kampala International University, to investigate the challenges of information security at Kampala International University, and also to ascer...
ABSTRACT The study was done to measure the main pulmonary artery diameter by Computed Tomography in normal subjects which were not suffer from the cardiac or pulmonary pathology. Fifty patients (20 males and 30 females) were selected with normal pulmonary artery pressure. The study was done in Algazeira Traumatology center during the period from October 2015 to August 2016. The widest diameter perpendicular to the long axis ofthe main pulmonary artery was measure with computer caliper at the ...